{"@attributes":{"version":"2.0"},"channel":{"title":"DEV Community: puppet","description":"The latest articles tagged 'puppet' on DEV Community.","link":"https:\/\/dev.to\/t\/puppet","language":"en","item":[{"title":"Puppetlabs Modules Roundup \u2013 April 2026","pubDate":"Thu, 07 May 2026 16:31:43 +0000","link":"https:\/\/dev.to\/puppet\/puppetlabs-modules-roundup-april-2026-358","guid":"https:\/\/dev.to\/puppet\/puppetlabs-modules-roundup-april-2026-358","description":"<p>In April 2026, the Puppetlabs module lineup saw 8 Puppetlabs module releases, with the most notable updates collected here for a quick review.<\/p>\n\n<p>The overall pattern in these releases was event forwarding enhancements and security and compliance platform updates, which makes this month\u2019s roundup a useful quick scan for teams planning upgrades or routine maintenance.<\/p>\n\n<h2>\n  \n  \n  Highlighted Updates\n<\/h2>\n\n<h3>\n  \n  \n  Event Forwarding Enhancements\n<\/h3>\n\n<p>Coordinated updates to Splunk HEC and PE Event Forwarding modules add support for orchestrator_plan event type, improving visibility into Puppet orchestrator activities with enhanced filtering and integration capabilities.<\/p>\n\n<ul>\n<li>Affected modules: splunk_hec, pe_event_forwarding.<\/li>\n<\/ul>\n\n<h3>\n  \n  \n  Security and Compliance Platform Updates\n<\/h3>\n\n<p>Comply and Comply Admin modules received coordinated releases, advancing the Security Compliance Management platform capabilities.<\/p>\n\n<ul>\n<li>Affected modules: comply, complyadm.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  What Updates Happened to Puppetlabs Modules in April 2026?\n<\/h2>\n\n<p>The following is an alphabetical listing of modules which received updates in April 2026. If a module had multiple versions released, the updates are collected together, numbered with the \"latest\" version available.<\/p>\n\n\n\n\n<h3>\n  \n  \n  cd4peadm 5.15.0\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-28 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/cd4peadm\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>A few highlights from this release:<\/p>\n\n<ul>\n<li>Added a Hiera configuration option, external_webhook_url, that allows you to set the webhook URL that Continuous Delivery sends to your VCS provider. This is useful if you are using a proxy between your VCS and CD.<\/li>\n<li>Added an idle timeout to the CD console that logs users out after 30 minutes. Configure this using the Hiera option, web_session_idle_timeout_mins.<\/li>\n<li>Added CSRF protection to the DeleteUserAccount and SetSuperUser endpoints by restricting them to POST requests and validating CSRF tokens issued at login and expired on logout.<\/li>\n<li>20 CVEs addressed.<\/li>\n<\/ul>\n\n<p>Check the official <a href=\"https:\/\/help.puppet.com\/cdpe\/current\/Content\/UserGuide\/CDPE\/ReleaseNotes\/cd_release_notes.htm#Version5150\" rel=\"noopener noreferrer\">release notes for cd4peadm 5.15.0<\/a> for the full details.<\/p>\n\n\n\n\n<h3>\n  \n  \n  comply 3.7.1\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-28 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/comply\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>A few highlights from this release:<\/p>\n\n<ul>\n<li>Fixed a stale image which resulted in checksum and benchmark issues upon install.<\/li>\n<li>\n<strong>CVE-2026-33815, CVE-2026-33816.<\/strong> Updated gorm.io to v5.9.2 to address these vulnerabilities.<\/li>\n<\/ul>\n\n<p>Check the official <a href=\"https:\/\/help.puppet.com\/scm\/current\/Content\/UserGuide\/SCM\/Release_notes\/release_notes.htm#SecurityComplianceManagement371\" rel=\"noopener noreferrer\">release notes for comply 3.7.1<\/a> for the full details.<\/p>\n\n\n\n\n<h3>\n  \n  \n  complyadm 3.7.1\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-28 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/complyadm\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>A few highlights from this release:<\/p>\n\n<ul>\n<li>Fixed a stale image which resulted in checksum and benchmark issues upon install.<\/li>\n<li>\n<strong>CVE-2026-33815, CVE-2026-33816.<\/strong> Updated gorm.io to v5.9.2 to address these vulnerabilities.<\/li>\n<\/ul>\n\n<p>Check the official <a href=\"https:\/\/help.puppet.com\/scm\/current\/Content\/UserGuide\/SCM\/Release_notes\/release_notes.htm#SecurityComplianceManagement371\" rel=\"noopener noreferrer\">release notes for complyadm 3.7.1<\/a> for the full details.<\/p>\n\n\n\n\n<h3>\n  \n  \n  lvm 4.0.1\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-30 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/lvm\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>This release addresses two bug fixes. A race condition where <code>lvcreate<\/code> returns before udev finishes processing device-add events could cause a subsequent <code>filesystem<\/code> resource targeting the same logical volume to fail with \"device or resource busy\" \u2014 the fix calls <code>udevadm settle<\/code> after a successful <code>lvcreate<\/code>. The release also corrects an AIX-specific issue where boolean filesystem parameters such as <code>isnapshot<\/code> were passed to <code>crfs<\/code> as <code>true<\/code>\/<code>false<\/code> instead of the required <code>yes<\/code>\/<code>no<\/code>, causing the command to reject them outright.<\/p>\n\n<ul>\n<li>(MODULES-11756) Wait for udev to settle after lvcreate <a href=\"https:\/\/github.com\/puppetlabs\/puppetlabs-lvm\/pull\/380\" rel=\"noopener noreferrer\">#380<\/a> (<a href=\"https:\/\/github.com\/imaqsood\" rel=\"noopener noreferrer\">imaqsood<\/a>)<\/li>\n<li>(MODULES-11788) Pass converted boolean parameter <a href=\"https:\/\/github.com\/puppetlabs\/puppetlabs-lvm\/pull\/379\" rel=\"noopener noreferrer\">#379<\/a> (<a href=\"https:\/\/github.com\/joshcooper\" rel=\"noopener noreferrer\">joshcooper<\/a>)<\/li>\n<\/ul>\n\n\n\n\n<h3>\n  \n  \n  pe_event_forwarding 2.3.0\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-09 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/pe_event_forwarding\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>This release adds orchestrator plan-job collection controls and fixes duplicate forwarding behavior in job collection.<\/p>\n\n<ul>\n<li>Added plan job data collection from the <code>orchestrator\/v1\/plan_jobs<\/code> API, with progress tracked in a dedicated <code>pe_event_forwarding_plan_index.yaml<\/code> state file.<\/li>\n<li>Added the <code>pe_event_forwarding::skip_plans<\/code> parameter to disable plan job collection when needed.<\/li>\n<li>Fixed <code>get_jobs<\/code> behavior where the first page could return more records than newly available jobs, which could cause duplicate forwarded data.<\/li>\n<li>Source attribution: <a href=\"https:\/\/github.com\/puppetlabs\/puppetlabs-pe_event_forwarding\/pull\/137\" rel=\"noopener noreferrer\">(PIE-1683) Add support for collecting plan data #137<\/a> (<a href=\"https:\/\/github.com\/coreymbe\" rel=\"noopener noreferrer\">coreymbe<\/a>).<\/li>\n<\/ul>\n\n\n\n\n<h3>\n  \n  \n  peadm 3.37.0\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-01 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/peadm\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>This release is a small change to add support for Puppet Enterprise 2025.10.0.<\/p>\n\n<ul>\n<li>(PE-43654) Add support for PE 2025.10.0 <a href=\"https:\/\/github.com\/puppetlabs\/puppetlabs-peadm\/pull\/661\" rel=\"noopener noreferrer\">#661<\/a> (<a href=\"https:\/\/github.com\/davidmalloncares\" rel=\"noopener noreferrer\">davidmalloncares<\/a>)<\/li>\n<\/ul>\n\n\n\n\n<h3>\n  \n  \n  sce_linux 2.6.1\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-06 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/sce_linux\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>A few highlights from this release:<\/p>\n\n<ul>\n<li>\n<strong>Error message:<\/strong> comparison of NilClass with  failed. Some users saw this error message and experienced catalog compilation failures when attempting to manage mounted file system options with SCE for Linux. The issue was caused by \/etc\/fstab files that did not have at least one comment line or blank line. The internal parser was updated to avoid the issue and help prevent compilation errors.<\/li>\n<li>\n<strong>sce_mount_info fact does not resolve to a value.<\/strong> This issue is related to the Linux findmnt command, which is used to list all mounted file systems. The command, which supports different options depending on operating system, was failing on specific systems, resulting in a failure of the sce_mount_info fact. Now, if the findmnt command fails, warnings will be logged, and the \/etc\/fstab file will be parsed directly for mount information.<\/li>\n<li>\n<strong>Error messages related to rsyslog.<\/strong> Because the version of the rsyslog logging service used on Red Hat Enterprise Linux (RHEL) 9 differs from earlier versions, users of RHEL 9 sometimes see error messages like this: imjournal: open() failed for path: '\/var\/lib\/rsyslog\/imjournal.state.tmp': Operation not permitted These messages indicate a failure to load the rsyslog imjournal module. To accommodate the changes in rsyslog and avoid this error, the module loading syntax was updated in SCE for Linux.<\/li>\n<\/ul>\n\n<p>Check the official <a href=\"https:\/\/help.puppet.com\/sce\/current\/linux\/scel_relnotes_261.htm\" rel=\"noopener noreferrer\">release notes for sce_linux 2.6.1<\/a> for the full details.<\/p>\n\n\n\n\n<h3>\n  \n  \n  splunk_hec 2.2.0\n<\/h3>\n\n<p>\ud83d\udcc5 Latest release: 2026-04-09 (\ud83c\udf10 <a href=\"https:\/\/forge.puppet.com\/modules\/puppetlabs\/splunk_hec\" rel=\"noopener noreferrer\">View on the Forge<\/a>)<\/p>\n\n<p>This release focuses on support for the <code>orchestrator_plan<\/code> event type from the <strong>puppetlabs-pe_event_forwarding<\/strong> module while also addressing <code>orchestrator_plan<\/code> to index mappings in util_splunk_hec template.<\/p>\n\n<ul>\n<li>Added support for the <code>orchestrator_plan<\/code> event type from the <strong>puppetlabs-pe_event_forwarding<\/strong> module.<\/li>\n<li>Added <code>orchestrator_plan<\/code> to index mappings in util_splunk_hec template.<\/li>\n<li>New PE Event Forwarding filter <code>orchestrator_plan_data_filter<\/code> to allow filtering orchestrator plan event payloads.<\/li>\n<li>Module dependency updated to ensure <code>pe_event_forwarding<\/code> v2.3.0+ is installed.<\/li>\n<li>Removed support for Debian platform and EOL operating system versions.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Until Next Time!\n<\/h2>\n\n<p>That\u2019s the full pass through the 8 Puppetlabs module releases from April 2026. The Forge links above are the quickest path to the underlying release details.<\/p>\n\n<p>If there is a part of the Puppetlabs ecosystem that would benefit from more context in future roundups, that feedback is worth sending along.<\/p>\n\n<p>Catch you in the next roundup for May 2026.<\/p>\n\n","category":"puppet"},{"title":"Why GRC Should Matter to Every Developer, Not Just Compliance Teams","pubDate":"Wed, 06 May 2026 13:53:13 +0000","link":"https:\/\/dev.to\/neviarrawl_44fe25f50\/why-grc-should-matter-to-every-developer-not-just-compliance-teams-24am","guid":"https:\/\/dev.to\/neviarrawl_44fe25f50\/why-grc-should-matter-to-every-developer-not-just-compliance-teams-24am","description":"<h2>\n  \n  \n  Why GRC Should Matter to Every Developer, Not Just Compliance Teams\n<\/h2>\n\n<p>When most people hear \"GRC\" \u2014 <a href=\"https:\/\/www.scrut.io\/post\/how-governance-aces-compliance-and-risk-management-in-the-grc-program\" rel=\"noopener noreferrer\">governance, risk management, and compliance<\/a> \u2014 they think of legal teams, auditors, or cybersecurity experts. Rarely do they think of developers.<\/p>\n\n<p>But the truth is, GRC affects everyone who builds, ships, and maintains technology.<\/p>\n\n<p>Whether you realize it or not, the choices you make in your code, architecture, or workflows impact your organization's ability to stay secure, compliant, and trusted.<\/p>\n\n<h2>\n  \n  \n  What is GRC Anyway?\n<\/h2>\n\n<p>GRC stands for:<\/p>\n\n<ul>\n<li>\n<strong>Governance:<\/strong> Making sure decisions align with company goals and policies.<\/li>\n<li>\n<strong>Risk Management:<\/strong> Identifying and reducing potential threats to systems, data, and users.<\/li>\n<li>\n<strong>Compliance:<\/strong> Following the laws, regulations, and industry standards that apply to your work.<\/li>\n<\/ul>\n\n<p>At its core, GRC is about <strong>protecting the business and its customers while enabling growth.<\/strong><\/p>\n\n<p>And guess who sits at the heart of building that growth? Developers and tech teams.<\/p>\n\n<h2>\n  \n  \n  Why Developers Should Care\n<\/h2>\n\n<p>Here\u2019s why GRC should be part of every developer\u2019s mindset:<\/p>\n\n<ul>\n<li>\n<strong>Security starts in the code:<\/strong> Secure coding practices directly affect risk management.<\/li>\n<li>\n<strong>Documentation matters:<\/strong> Process documentation makes audits and compliance checks smoother \u2014 and helps your team scale faster.<\/li>\n<li>\n<strong>Tech debt can become risk debt:<\/strong> Skipping best practices today can create serious governance and compliance issues tomorrow.<\/li>\n<li>\n<strong>Customers expect trust:<\/strong> Data breaches and compliance failures destroy trust. Good GRC practices protect it.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  How Developers Can Contribute to GRC\n<\/h2>\n\n<p>You don't need to become a compliance officer overnight.<\/p>\n\n<p>Simple steps make a big difference:<\/p>\n\n<ul>\n<li>Follow secure coding guidelines (like OWASP Top 10).<\/li>\n<li>Document your APIs, services, and system behaviors clearly.<\/li>\n<li>Keep dependencies up-to-date and monitor for vulnerabilities.<\/li>\n<li>Understand the compliance requirements that apply to your industry (HIPAA, GDPR, SOC 2, etc.).<\/li>\n<li>Speak up if you see a potential risk or issue \u2014 risk management is everyone's job.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Final Thoughts\n<\/h2>\n\n<p>GRC is not just a checkbox for the legal team.<\/p>\n\n<p>It\u2019s a shared responsibility \u2014 and one that smart developers embrace.<\/p>\n\n<p>When you understand governance, risk, and compliance, you become a more valuable teammate, a better builder, and a stronger protector of your organization\u2019s future.<\/p>\n\n<p>Tech doesn\u2019t exist in a vacuum. Neither does trust.<\/p>\n\n<p>Let\u2019s build better, safer, more resilient systems \u2014 together.<\/p>\n\n","category":["grc","infosec","security","puppet"]},{"title":"Puppet for System Administrators: A Comprehensive Guide","pubDate":"Sat, 02 May 2026 06:30:14 +0000","link":"https:\/\/dev.to\/koenig_solutions\/puppet-for-system-administrators-a-comprehensive-guide-58f2","guid":"https:\/\/dev.to\/koenig_solutions\/puppet-for-system-administrators-a-comprehensive-guide-58f2","description":"<h2>\n  \n  \n  Introduction\n<\/h2>\n\n<p>In the ever-evolving world of IT, effective configuration management is vital for maintaining system integrity and optimizing workflow. <strong>Puppet<\/strong> stands as a powerful automation tool designed specifically for system administrators. It empowers them to manage infrastructure as code, ensuring consistency, reliability, and reduced manual effort.<\/p>\n\n<h2>\n  \n  \n  What is Puppet?\n<\/h2>\n\n<p>Puppet is an open-source software configuration management tool that allows you to define the state of your infrastructure. It enables automation of system administration tasks across a network of devices. Here are key features of Puppet:<\/p>\n\n<ul>\n<li>\n<strong>Declarative Language:<\/strong> Puppet uses a simple, declarative language to define system states.<\/li>\n<li>\n<strong>Resource Abstraction:<\/strong> You can manage multiple resources like files, packages, and services without worrying about underlying system specifics.<\/li>\n<li>\n<strong>Idempotency:<\/strong> Puppet ensures that no matter how many times you apply a configuration, the final state remains unchanged.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Why Use Puppet?\n<\/h2>\n\n<p>For system administrators, Puppet offers several compelling benefits:<\/p>\n\n<ul>\n<li>\n<strong>Efficiency:<\/strong> Automate repetitive tasks to save time.<\/li>\n<li>\n<strong>Consistency:<\/strong> Ensure uniform configurations across different systems.<\/li>\n<li>\n<strong>Scalability:<\/strong> Easily manage large numbers of servers across diverse environments.<\/li>\n<li>\n<strong>Version Control:<\/strong> Puppet allows tracking of changes, akin to software development, facilitating better rollback capabilities.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Getting Started with Puppet\n<\/h2>\n\n<p>Before diving deeper into Puppet's capabilities, here are some <strong>practical tips<\/strong> for getting started:<\/p>\n\n<ol>\n<li>\n<strong>Install Puppet:<\/strong> Start by installing Puppet on your primary server, known as the Puppet Master. Nodes that will be managed can connect to this Master.\n\n<ul>\n<li>Use package managers like APT or YUM for Linux distributions.<\/li>\n<li>For Windows, enable using the MSI installer.<\/li>\n<\/ul>\n<\/li>\n<li>\n<strong>Create a Manifest:<\/strong> A manifest is a file where you define the resources. Begin with a simple one:<\/li>\n<\/ol>\n\n<p>file { '\/tmp\/example.txt':<br>\n     ensure =&gt; present,<br>\n     content =&gt; 'Hello, Puppet!',<br>\n   }<\/p>\n\n<ol>\n<li>\n<strong>Test Your Configuration:<\/strong> Use the agent on the client machines to test your Manifest to ensure it works as expected.<\/li>\n<li>\n<strong>Utilize the Puppet Forge:<\/strong> Access a repository of reusable modules and codes that can help you implement solutions faster.<\/li>\n<\/ol>\n\n<h2>\n  \n  \n  Puppet Architecture\n<\/h2>\n\n<p>Understanding Puppet\u2019s architecture is crucial for effective management:<\/p>\n\n<ul>\n<li>\n<strong>Puppet Master:<\/strong> The central server that compiles configurations.<\/li>\n<li>\n<strong>Puppet Agent:<\/strong> The client installed on nodes that communicates with the Puppet Master to fetch configurations.<\/li>\n<li>\n<strong>Catalog:<\/strong> A document containing the desired state of a node, compiled by the Puppet Master.<\/li>\n<li>\n<strong>Resource Types:<\/strong> Define various system elements such as packages, services, or files.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Essential Puppet Commands\n<\/h2>\n\n<p>Here are several commands every System Administrator should know:<\/p>\n\n<ul>\n<li>\n<strong><code>puppet agent -t<\/code>:<\/strong> To test the agent and apply configurations.<\/li>\n<li>\n<strong><code>puppet status<\/code>:<\/strong> To check the current status of agents.<\/li>\n<li>\n<strong><code>puppet resource<\/code>:<\/strong> To query the current state of a resource.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Advanced Puppet Features\n<\/h2>\n\n<p>Once you grasp the basics, consider exploring advanced features to enhance your Puppet skills:<\/p>\n\n<ul>\n<li>\n<strong>Hiera Configuration:<\/strong> Use Hiera for data separation and to manage environment-specific variables effectively.<\/li>\n<li>\n<strong>Puppet Modules:<\/strong> Organize shared code in modules to make your manifests cleaner and reusable.<\/li>\n<li>\n<strong>Environment Management:<\/strong> Separate code into different environments to safely test changes before applying them in production.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Continuous Learning: Puppet Certifications\n<\/h2>\n\n<p>To deepen your Puppet knowledge, consider investing in training or certification. Platforms such as <a href=\"https:\/\/www.koenig-solutions.com\/puppet-certification-training?utm_source=devto&amp;utm_medium=backlink&amp;utm_campaign=web20-publisher\" rel=\"noopener noreferrer\">Puppet for System Administrators<\/a> provide structured learning paths and official recognition of your skills. This can enhance your career prospects and solidify your expertise.<\/p>\n\n<h2>\n  \n  \n  Conclusion\n<\/h2>\n\n<p>Puppet is an invaluable tool for system administrators looking to streamline their workflows and improve system management. By harnessing Puppet\u2019s capabilities, you can automate tasks, enforce configurations, and ultimately provide a more reliable IT service. Start small, practice regularly, and continuously seek to learn more as technology evolves.<\/p>\n\n","category":["puppet","systemadministration","configurationmanagement"]},{"title":"Puppet Continuous Delivery 5.15.0 is now available","pubDate":"Wed, 29 Apr 2026 16:20:25 +0000","link":"https:\/\/dev.to\/puppet\/puppet-continuous-delivery-5150-is-now-available-5990","guid":"https:\/\/dev.to\/puppet\/puppet-continuous-delivery-5150-is-now-available-5990","description":"<p>Puppet Continuous Delivery (CD) <strong>version 5.15.0<\/strong> is now available, with updates focused on stability, security, and day\u2011to\u2011day usability for teams running Puppet automation pipelines at scale.<\/p>\n\n<p>If you\u2019re already on CD 5.x, this is a straightforward upgrade that continues the work of refining the platform while keeping it aligned with current Puppet Enterprise releases and supported tooling.<\/p>\n\n<p>The detailed release notes are linked below, but here\u2019s a quick breakdown of what this release delivers and why you may want to upgrade.<\/p>\n\n<h2>\n  \n  \n  What\u2019s included in CD 5.15.0\n<\/h2>\n\n<p>CD 5.15.0 delivers targeted updates across webhook configuration, Pipelines as Code, Impact Analysis, VCS integrations, and platform security. The changes below focus on specific features and integrations rather than broad platform behavior.<\/p>\n\n<h3>\n  \n  \n  Webhooks, sessions, and configuration\n<\/h3>\n\n<ul>\n<li>Added a new Hiera configuration option, <code>external_webhook_url<\/code>, which allows you to explicitly set the webhook URL that Continuous Delivery sends to your VCS provider. This is intended for deployments where CD is running behind a proxy.<\/li>\n<li>Added an idle session timeout to the CD console. Users are logged out after 30 minutes of inactivity by default, configurable using the <code>web_session_idle_timeout_mins<\/code> Hiera option.<\/li>\n<\/ul>\n\n<h3>\n  \n  \n  Pipelines as Code and Impact Analysis\n<\/h3>\n\n<ul>\n<li>Added the <code>skip_empty_catalogs<\/code> parameter to the Impact Analysis settings in the Pipelines as Code schema. When enabled, nodes with no catalog resources in PuppetDB are excluded from Impact Analysis results.<\/li>\n<li>Fixed an issue where the browser would stop polling for Impact Analysis results when an IA run finished or when navigating away from the IA details view.<\/li>\n<\/ul>\n\n<h3>\n  \n  \n  VCS integrations (Azure DevOps and GitLab)\n<\/h3>\n\n<ul>\n<li>Updated the <strong>Pipeline Summary<\/strong> view so the <code>by<\/code> field now displays the initiating user\u2019s <strong>display name<\/strong> for Azure DevOps pipelines, instead of the user ID.<\/li>\n<li>Changed how Continuous Delivery sends commit status updates to <strong>GitLab<\/strong>. When native GitLab pipelines are present, all CD commit status updates are now attached to the same branch pipeline, avoiding fragmented status reporting.<\/li>\n<\/ul>\n\n<h3>\n  \n  \n  Data visibility and usability fixes\n<\/h3>\n\n<ul>\n<li>Fixed an issue where <code>package_updates<\/code> for <code>pe_patch<\/code> data did not appear in the fact picker. The query service was updated so this data now displays correctly.<\/li>\n<\/ul>\n\n<h3>\n  \n  \n  Security and authorization hardening\n<\/h3>\n\n<ul>\n<li>Added CSRF protection to the <code>DeleteUserAccount<\/code> and <code>SetSuperUser<\/code> endpoints by restricting them to POST requests and validating CSRF tokens issued at login and expired on logout.<\/li>\n<li>Fixed an issue where any authenticated user could enumerate user accounts and email addresses. Access to the <code>GET \/v1\/users<\/code> endpoint is now properly restricted to root and superusers.<\/li>\n<li>Fixed an authorization bypass on the GraphQL <code>\/query<\/code> endpoint where permission checks could be skipped when using workspace variables or omitting the <code>id<\/code> field. Authorization is now enforced consistently.<\/li>\n<\/ul>\n\n<h3>\n  \n  \n  Platform and runtime updates\n<\/h3>\n\n<ul>\n<li>Added <strong>Amazon Linux 2023<\/strong> as a supported platform for Docker\u2011based installs.<\/li>\n<li>Updated the Postgres base image to <code>postgres:17-trixie<\/code>.<\/li>\n<\/ul>\n\n<h3>\n  \n  \n  Security dependency updates\n<\/h3>\n\n<p>This release includes dependency updates to address reported vulnerabilities, including updates to:<\/p>\n\n<ul>\n<li>lodash<\/li>\n<li>diffjs<\/li>\n<li>plexus-utils<\/li>\n<li>glibc<\/li>\n<li>undici<\/li>\n<li>jackson<\/li>\n<li>Jetty (updated to version 12)<\/li>\n<li>golang.org\/x\/crypto<\/li>\n<li>quartz<\/li>\n<li>logrus<\/li>\n<li>log4j2<\/li>\n<li>bouncy-castle<\/li>\n<\/ul>\n\n<p>Refer to <a href=\"https:\/\/help.puppet.com\/cdpe\/current\/Content\/UserGuide\/CDPE\/ReleaseNotes\/cd_release_notes.htm#Version5150\" rel=\"noopener noreferrer\">the release notes<\/a> for the full list of CVEs addressed in this release.<\/p>\n\n<h2>\n  \n  \n  Why this release matters\n<\/h2>\n\n<p>For most users, CD sits in the middle of multiple systems: source control, CI tooling, Puppet Enterprise, and infrastructure targets. Small issues can quickly turn into pipeline friction.<\/p>\n\n<p>CD 5.15.0 continues the effort to:<\/p>\n\n<ul>\n<li>Reduce pipeline noise caused by edge\u2011case failures<\/li>\n<li>Improve the quality of feedback when something goes wrong<\/li>\n<li>Keep security posture current without forcing disruptive changes<\/li>\n<li>Make upgrades between minor versions low\u2011risk<\/li>\n<\/ul>\n\n<p>If you\u2019re standardizing on CD 5.x, staying current helps ensure you\u2019re getting fixes before they turn into operational problems.<\/p>\n\n<h2>\n  \n  \n  Installation and upgrade notes\n<\/h2>\n\n<p>If you\u2019re new to Puppet Continuous Delivery, start with the official install documentation:<\/p>\n\n<ul>\n<li><a href=\"https:\/\/help.puppet.com\/cdpe\/current\/Content\/UserGuide\/CDPE\/Installation\/install_set_up.htm\" rel=\"noopener noreferrer\">Puppet CD installation docs<\/a><\/li>\n<\/ul>\n\n<p>If you\u2019re already running CD 5.x, upgrading to 5.15.0 should follow the standard upgrade path described in the documentation:<\/p>\n\n<ul>\n<li><a href=\"https:\/\/help.puppet.com\/cdpe\/current\/Content\/UserGuide\/CDPE\/Upgrade\/upgrading.htm\" rel=\"noopener noreferrer\">Puppet CD upgrade docs<\/a><\/li>\n<\/ul>\n\n<p>As always, review the release notes before upgrading, especially if you rely on specific integrations or custom pipeline behavior.<\/p>\n\n<h2>\n  \n  \n  Read the full details\n<\/h2>\n\n<p>For the complete list of fixes, security updates, and known issues, check the official release notes:<\/p>\n\n<ul>\n<li><a href=\"https:\/\/help.puppet.com\/cdpe\/current\/Content\/UserGuide\/CDPE\/ReleaseNotes\/cd_release_notes.htm#Version5150\" rel=\"noopener noreferrer\">Continuous Delivery 5.15.0 release notes<\/a><\/li>\n<\/ul>\n\n<p>If you have feedback or run into issues after upgrading, the Puppet community channels are always a good place to share what you\u2019re seeing.<\/p>\n\n\n\n\n<p>Happy automating!<\/p>\n\n","category":["puppet","cicd"]},{"title":"ConfDroid Puppet Modules - java","pubDate":"Sat, 18 Apr 2026 16:24:20 +0000","link":"https:\/\/dev.to\/12ww1160\/confdroid-puppet-modules-java-5abd","guid":"https:\/\/dev.to\/12ww1160\/confdroid-puppet-modules-java-5abd","description":"<h2>\n  \n  \n  Introducing confdroid_java: A Lightweight Helper for Reliable Java Installations\n<\/h2>\n\n<p>We\u2019re continuing the ConfDroid Puppet modules series with a small but essential addition: <strong>confdroid_java<\/strong>.<\/p>\n\n<p>This module does exactly one thing\u2014and does it well. It installs and configures a specified Java version so that other Puppet modules can simply rely on it being there. No more guessing, no more manual setup, and no more version conflicts when you spin up Java-based services.<\/p>\n\n<p>Think of it as the Java counterpart to our popular <strong>confdroid_php<\/strong> module. Just as <code>confdroid_php<\/code> prepares a clean PHP environment for applications like WordPress or Nagios, confdroid_java sets up the exact Java runtime that tools like <code>confdroid_jenkins<\/code> (and any future Java-dependent modules) expect. It keeps everything consistent, reproducible, and ready for automation.<\/p>\n\n<h2>\n  \n  \n  What confdroid_java actually does\n<\/h2>\n\n<ul>\n<li>Installs the Java binaries you specify through parameters<\/li>\n<li>Places all necessary configuration files in the correct locations<\/li>\n<li>Automatically applies the right SELinux contexts (and gracefully ignores them on systems where SELinux is disabled)<\/li>\n<li>Stays deliberately lightweight\u2014no unnecessary features, no external module dependencies<\/li>\n<\/ul>\n\n<p>It is designed to be a silent foundation. You include it once, and every Java-needing module that follows can simply assume a working Java environment is already in place. Confdroid modules which rely on it like <a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_jenkins\" rel=\"noopener noreferrer\">confdroid_jenkins<\/a> automatically add it, as long as it is in the Puppet catalogue.<\/p>\n\n<h2>\n  \n  \n  Supported platforms\n<\/h2>\n\n<ul>\n<li>Fully tested and validated on Rocky Linux 9<\/li>\n<li>Expected to work on all RHEL 9-based distributions<\/li>\n<li>Requires Puppet 8<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  How to use it\n<\/h2>\n\n<p>The simplest way is just to include the class:<br>\n<\/p>\n\n<div class=\"highlight js-code-highlight\">\n<pre class=\"highlight puppet\"><code><span class=\"k\">node<\/span> <span class=\"s1\">'example.example.net'<\/span> <span class=\"p\">{<\/span>\n  <span class=\"k\">include<\/span> <span class=\"nc\">confdroid_java<\/span>\n<span class=\"p\">}<\/span>\n<\/code><\/pre>\n\n<\/div>\n\n\n\n<p>Or, if you manage your nodes with Foreman, simply set the desired parameters (Java version, installation source, etc.) directly in the host or host-group configuration. No extra code required.<\/p>\n\n<blockquote>\n<p>Important note: This module is meant for fresh systems. If Java has already been installed or configured manually on a server, applying confdroid_java could overwrite those changes. Always test in a lab environment first.<\/p>\n<\/blockquote>\n\n<h2>\n  \n  \n  Where to get it\n<\/h2>\n\n<p>The full module, complete documentation, and parameter reference are available right now in the <a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_java\" rel=\"noopener noreferrer\">Confdroid Forge:<\/a><\/p>\n\n<p>You\u2019ll also find the generated documentation in the <code>doc\/<\/code> folder inside the repository.<\/p>\n\n<h2>\n  \n  \n  Why this module matters\n<\/h2>\n\n<p>In larger Puppet environments, helper modules like confdroid_java (and its PHP sibling) are the glue that makes everything else click. They remove duplication, enforce consistency, and let the bigger application modules focus on what they do best\u2014managing Jenkins, application servers, or any other Java workload\u2014without reinventing the Java installation wheel every time.<br>\nIf you\u2019re already running other ConfDroid modules on Rocky 9, adding confdroid_java is a quick win that will make your Java-based services even more reliable and easier to maintain.<br>\nHappy automating!<br>\nAs always, feedback and pull requests are welcome in the repository.<\/p>\n\n\n\n\n<p>Did you find this post helpful?  You can support me.<\/p>\n\n<p><a href=\"https:\/\/www.buymeacoffee.com\/grizzly_coda\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2znn4km0i2jib7ru1sm9.png\" alt=\"\" width=\"170\" height=\"37\"><\/a><\/p>\n\n<p><a href=\"https:\/\/hetzner.cloud\/?ref=EY14C8Tema9j\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyab43i0ysz9uwuq267u0.png\" alt=\"Hetzner Referral\" width=\"400\" height=\"37\"><\/a><\/p>\n\n<p><a href=\"https:\/\/confdroid.substack.com\/subscribe?params=%5Bobject%20Object%5D\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9r49xyl05rwkjb52xbqg.png\" alt=\"Substack\" width=\"250\" height=\"30\"><\/a><\/p>\n\n<p><a href=\"https:\/\/feedback.confdroid.com\/\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy7d47hck6vziak35nfgf.png\" alt=\"ConfDroid Feedback Portal\" width=\"300\" height=\"63\"><\/a><\/p>\n\n<h2>\n  \n  \n  Related posts\n<\/h2>\n\n<ul>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-pilot\/\" rel=\"noopener noreferrer\">Confdroid Puppet Modules - Pilot<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-puppet\/\" rel=\"noopener noreferrer\">Confdroid Puppet Modules - Puppet<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-resources\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - confdroid_resources<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-postgresql\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Postgresql<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-gitea\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Gitea<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-apache\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Apache<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-nagios\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Nagios<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-nrpe\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - NRPE<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-fail2ban\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Fail2ban<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-automatic\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Automatic<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-selinux\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Selinux<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-ssh\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - SSH<\/a><\/li>\n<\/ul>\n\n","category":["java","puppet","foreman"]},{"title":"ConfDroid Puppet Modules - SSH","pubDate":"Sat, 18 Apr 2026 15:33:33 +0000","link":"https:\/\/dev.to\/12ww1160\/confdroid-puppet-modules-ssh-1kke","guid":"https:\/\/dev.to\/12ww1160\/confdroid-puppet-modules-ssh-1kke","description":"<h2>\n  \n  \n  Introducing confdroid_ssh: Reliable and Hardened SSH Access for Your Rocky 9 Servers\n<\/h2>\n\n<p>SSH is the primary way we access and manage Linux servers. When SSH stops working, everything else grinds to a halt \u2014 troubleshooting becomes painful, and automation pipelines can fail.<\/p>\n\n<p>To solve this, I created <strong>confdroid_ssh<\/strong>, a new Puppet 8 module that ensures the SSH daemon (sshd) is always installed, properly configured, running, and reachable.<\/p>\n\n<p>The module provides a hardened, consistent SSH setup across your entire infrastructure while making it easy to apply custom security policies.<\/p>\n\n<h2>\n  \n  \n  Why This Module Matters\n<\/h2>\n\n<ul>\n<li>Guarantees SSH access is always available.<\/li>\n<li>Applies secure defaults for ciphers, MAC algorithms, and other important settings<\/li>\n<li>Manages the main sshd_config safely through drop-in files in \/etc\/ssh\/sshd_config.d\/<\/li>\n<li>Handles SELinux contexts automatically (works great together with confdroid_selinux)<\/li>\n<li>Optionally manages firewall rules to keep the SSH port open<\/li>\n<li>Prevents configuration drift and manual overrides that often cause problems<\/li>\n<\/ul>\n\n<p>It fits perfectly into the Confdroid collection alongside <code>confdroid_selinux<\/code> (for global SELinux enforcement) and <code>confdroid_fail2ban<\/code> (for brute-force protection on SSH).<\/p>\n\n<h2>\n  \n  \n  Key Features\n<\/h2>\n\n<ul>\n<li>Installs the SSH server packages and required binaries<\/li>\n<li>Manages the sshd service (ensures it is enabled and running)<\/li>\n<li>Supports custom configuration snippets via the confdroid_ssh::custom::custom_config define<\/li>\n<li>Automatically applies correct SELinux contexts<\/li>\n<li>Optionally opens the SSH port in the firewall (iptables\/nftables)<\/li>\n<li>Designed for Rocky 9 (and other RHEL 9-based systems)<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Example: Adding Custom Configuration\n<\/h2>\n\n<p>You can easily add your own secure settings without touching the main config file:<br>\n<\/p>\n\n<div class=\"highlight js-code-highlight\">\n<pre class=\"highlight puppet\"><code><span class=\"n\">confdroid_ssh::custom::custom_config<\/span> <span class=\"p\">{<\/span> <span class=\"s1\">'30-my-hardening'<\/span><span class=\"p\">:<\/span>\n  <span class=\"py\">config_name<\/span>    <span class=\"p\">=&gt;<\/span> <span class=\"s1\">'30-my-hardening'<\/span><span class=\"p\">,<\/span>\n  <span class=\"py\">config_content<\/span> <span class=\"p\">=&gt;<\/span> <span class=\"p\">[<\/span>\n    <span class=\"s1\">'PasswordAuthentication no'<\/span><span class=\"p\">,<\/span>\n    <span class=\"s1\">'PermitRootLogin no'<\/span><span class=\"p\">,<\/span>\n    <span class=\"s1\">'MaxAuthTries 3'<\/span><span class=\"p\">,<\/span>\n  <span class=\"p\">],<\/span>\n<span class=\"p\">}<\/span>\n<\/code><\/pre>\n\n<\/div>\n\n\n\n<p>This creates a cleanly managed file \/etc\/ssh\/sshd_config.d\/30-my-hardening.conf, overriding default settings from the main configuration file.<\/p>\n\n<h2>\n  \n  \n  How It Fits in the Confdroid Ecosystem\n<\/h2>\n\n<p><code>confdroid_ssh<\/code> works hand-in-hand with the rest of the collection:<\/p>\n\n<ul>\n<li>\n<code>confdroid_selinux<\/code> ensures the global SELinux mode is set correctly<\/li>\n<li>\n<code>confdroid_fail2ban<\/code> protects SSH against brute-force attacks\nAll other modules benefit from reliable SSH access for management and deployment.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Important Notes\n<\/h2>\n\n<blockquote>\n<p>Warning: This module overwrites SSH configuration. Do not use it right on systems that have heavy manual SSH customizations. Always test first in a non-production environment, and move your manual configuration into the module via the provided define see example. It is likely best practice to use small snippets depending on various conditions <strong>only when<\/strong> they apply. Not every Linux system follows the same pattern depending on the applications it hosts.<br>\nThe module follows the Confdroid \u201cENC-first\u201d philosophy \u2014 configure everything comfortably through Foreman smart class parameters.<\/p>\n<\/blockquote>\n\n<p>You can find the full module, source code, parameter reference, and documentation <a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_ssh\" rel=\"noopener noreferrer\">here: https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_ssh<\/a><\/p>\n\n<h2>\n  \n  \n  Final Thoughts\n<\/h2>\n\n<p>With <code>confdroid_ssh<\/code>, you no longer have to worry about SSH breaking after updates or configuration changes. It provides a solid, hardened, and fully automated foundation for secure remote access across your Rocky 9 fleet.<\/p>\n\n<p>Combined with <code>confdroid_selinux<\/code> and <code>confdroid_fail2ban<\/code>, it forms a strong security layer that keeps your servers accessible to you \u2014 but not to attackers.<br>\nHave you ever lost SSH access due to a misconfiguration or update? How do you currently manage SSH hardening across your servers? Share your experiences or questions in the comments \u2014 I\u2019d love to hear them!<\/p>\n\n\n\n\n<p>Did you find this post helpful?  You can support me.<\/p>\n\n<p><a href=\"https:\/\/www.buymeacoffee.com\/grizzly_coda\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2znn4km0i2jib7ru1sm9.png\" alt=\"\" width=\"170\" height=\"37\"><\/a><\/p>\n\n<p><a href=\"https:\/\/hetzner.cloud\/?ref=EY14C8Tema9j\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyab43i0ysz9uwuq267u0.png\" alt=\"Hetzner Referral\" width=\"400\" height=\"37\"><\/a><\/p>\n\n<p><a href=\"https:\/\/confdroid.substack.com\/subscribe?params=%5Bobject%20Object%5D\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9r49xyl05rwkjb52xbqg.png\" alt=\"Substack\" width=\"250\" height=\"30\"><\/a><\/p>\n\n<p><a href=\"https:\/\/feedback.confdroid.com\/\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy7d47hck6vziak35nfgf.png\" alt=\"ConfDroid Feedback Portal\" width=\"300\" height=\"63\"><\/a><\/p>\n\n<h2>\n  \n  \n  Related posts\n<\/h2>\n\n<ul>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-pilot\/\" rel=\"noopener noreferrer\">Confdroid Puppet Modules - Pilot<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-puppet\/\" rel=\"noopener noreferrer\">Confdroid Puppet Modules - Puppet<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-resources\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - confdroid_resources<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-postgresql\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Postgresql<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-gitea\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Gitea<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-apache\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Apache<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-nagios\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Nagios<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-nrpe\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - NRPE<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-fail2ban\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Fail2ban<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-automatic\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Automatic<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-selinux\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Selinux<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-java\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - java<\/a><\/li>\n<\/ul>\n\n","category":["sshd","access","puppet","foreman"]},{"title":"Security Compliance Management 3.7.0 Is Now Available","pubDate":"Wed, 15 Apr 2026 14:56:44 +0000","link":"https:\/\/dev.to\/puppet\/security-compliance-management-370-is-now-available-1i47","guid":"https:\/\/dev.to\/puppet\/security-compliance-management-370-is-now-available-1i47","description":"<p>Security Compliance Management (SCM) 3.7.0 helps teams assess systems against recognized security benchmarks. This release supports evolving baselines and improves audit readiness, operational reliability, and overall governance by giving administrators tighter control over platform performance, user access, and API security within the Puppet Enterprise platform.<\/p>\n\n<h2>\n  \n  \n  What's new in this release\n<\/h2>\n\n<h3>\n  \n  \n  Expanded benchmark coverage for evolving environments\n<\/h3>\n\n<p>SCM 3.7.0 updates CIS-CAT Pro Assessor benchmark coverage to support newer operating systems and standards. This helps ensure compliance reporting remains current as teams adopt new platforms.<\/p>\n\n<p>Highlights include:<\/p>\n\n<ul>\n<li><p>New CIS benchmarks for numerous Linux distributions and macOS.<\/p><\/li>\n<li><p>An updated benchmark for Microsoft Windows 11 Enterprise.<\/p><\/li>\n<\/ul>\n\n<h3>\n  \n  \n  More predictable performance during compliance scans\n<\/h3>\n\n<p>Administrators can now control JVM memory allocation for the CIS Assessor, allowing performance tuning based on environment size and available resources. This results in more reliable scans and fewer disruptions during compliance assessments.<\/p>\n\n<h3>\n  \n  \n  Greater control over user access and session behavior\n<\/h3>\n\n<p>New centralized session management options allow administrators to better align SCM authentication behavior with corporate security and identity policies. The outcome is reduced risk from long-lived sessions and improved governance.<\/p>\n\n<h3>\n  \n  \n  Improved API governance and security posture\n<\/h3>\n\n<p>Additional GraphQL controls help limit exposure and enforce request limits in regulated or security-sensitive environments. The smaller API attack surface provides stronger API governance.<\/p>\n\n<h3>\n  \n  \n  Security fixes and dependency updates\n<\/h3>\n\n<p>This release addresses multiple known vulnerabilities across core dependencies, helping reduce inherited risk and support ongoing vulnerability management.<\/p>\n\n<p>For a complete list of addressed CVEs and detailed configuration guidance, see the release notes.<\/p>\n\n<h2>\n  \n  \n  Why Upgrade to SCM 3.7.0\n<\/h2>\n\n<p>Organizations should consider upgrading to SCM 3.7.0 to reduce compliance gaps, stabilize large-scale assessments, and strengthen security controls as environments grow more complex.<\/p>\n\n<p>With this release, teams can:<\/p>\n\n<ul>\n<li><p>Maintain audit readiness as new operating systems and benchmarks are adopted.<\/p><\/li>\n<li><p>Improve scan reliability and performance in large-scale environments managed through Puppet Enterprise.<\/p><\/li>\n<li><p>Centralize and standardize user session and API behavior across the platform.<\/p><\/li>\n<li><p>Reduce exposure to known vulnerabilities through updated dependencies and security fixes.<\/p><\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Next Steps\n<\/h2>\n\n<ul>\n<li><p>Review the\u00a0<a href=\"https:\/\/help.puppet.com\/scm\/current\/Content\/UserGuide\/SCM\/Release_notes\/release_notes.htm#SecurityComplianceManagement370\" rel=\"noopener noreferrer\">release notes<\/a>\u00a0for technical details and configuration information.<\/p><\/li>\n<li><p>Upgrade to SCM 3.7.0 to take advantage of expanded coverage and new governance controls.<\/p><\/li>\n<\/ul>\n\n","category":["puppet","security"]},{"title":"Generate a Puppet Module Using GitHub Copilot and VS Code","pubDate":"Mon, 13 Apr 2026 13:23:29 +0000","link":"https:\/\/dev.to\/puppet\/generate-a-puppet-module-using-github-copilot-and-vs-code-50mm","guid":"https:\/\/dev.to\/puppet\/generate-a-puppet-module-using-github-copilot-and-vs-code-50mm","description":"<p>This tutorial shows how to use GitHub Copilot with the Puppet Model Context Protocol (MCP) server to generate, validate, and refine a Puppet module\u2014even if you\u2019re new to Puppet development.\u00a0<\/p>\n\n<h3>\n  \n  \n  What You\u2019ll Learn\u00a0\n<\/h3>\n\n<ul>\n<li>  How to configure GitHub Copilot with the Puppet MCP server\u00a0<\/li>\n<li>  How AI agents can use the Puppet Development Kit (PDK) to generate Puppet modules\u00a0<\/li>\n<li>  How AI agents can use the PDK to validate and iterate on generated Puppet code<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  The Challenge: Overcoming the Puppet Module Learning Curve\u00a0\n<\/h2>\n\n<p>When you start automating infrastructure with Puppet, you might face an initial learning curve. You will begin to learn Puppet syntax, best practices around module structure and Puppet Domain-Specific Language (DSL), and even what tools are available to you.\u00a0\u00a0<\/p>\n\n<p>To help DevOps practitioners get started, Puppet first released an MCP server to\u00a0<a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/infra-assistant-code-assist.htm\" rel=\"noopener noreferrer\">accelerate development<\/a>\u00a0when using the new Puppet EdgeOps module for\u00a0<a href=\"https:\/\/www.puppet.com\/blog\/puppet-edge-code-assist\" rel=\"noopener noreferrer\">working with network devices<\/a>. Starting with Puppet Enterprise Advanced 2025.7, tools are available to provide even more guidance and information for working with agents on Puppet code in control repos, tasks, and modules. Traditional module development demanded deep domain expertise that teams often lack, but using modern AI-assisted development flows can help you bridge the knowledge gap.\u00a0<\/p>\n\n<p>Puppet's MCP server can be used with your favorite Integrated Development Environment (IDE) and code assist agent so that you can describe your requirements in natural language and work with your agent to get validated Puppet code and architecture. This tutorial demonstrates the use of Visual Studio (VS) Code and GitHub Copilot to generate a Puppet module with minimal Puppet expertise, helping you get started faster!\u00a0\u00a0<\/p>\n\n<p>\u26a0\ufe0f\u00a0<strong>Important:<\/strong>\u00a0AI tools make mistakes, just like people. For this reason, your process should always involve review and testing as part of the end-to-end process. Use these tools to augment yourself and the team, but make those tools earn your trust.\u00a0<\/p>\n\n<p>Time to get started!<\/p>\n\n<h2>\n  \n  \n  Tech Stack Overview: VS Code, GitHub Copilot, and Puppet MCP\u00a0\n<\/h2>\n\n<p><a href=\"https:\/\/www.puppet.com\/sites\/default\/files\/inline-images\/1.png\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdz63dnnmh3aa53llhhw7.png\" alt=\"Flow chart depicting VS Code, GitHub, and MCP Server\" width=\"800\" height=\"800\"><\/a><\/p>\n\n<p>For this tutorial, the Puppet development workflow will combine three key technologies:\u00a0<\/p>\n\n<ul>\n<li>  <a href=\"https:\/\/code.visualstudio.com\/download\" rel=\"noopener noreferrer\"><strong>Visual Studio Code<\/strong><\/a><strong>:<\/strong>\u00a0Serves as the IDE where all coding (and code generation) happens. \u00a0<\/li>\n<li>  <a href=\"https:\/\/code.visualstudio.com\/docs\/copilot\/overview\" rel=\"noopener noreferrer\"><strong>GitHub Copilot<\/strong><\/a><strong>:<\/strong>\u00a0Acts as the AI coding assistant that provides intelligent code suggestions and executes autonomous tasks.\u00a0\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/infra-assistant-code-assist.htm\" rel=\"noopener noreferrer\"><strong>Puppet MCP server<\/strong><\/a><strong>:<\/strong>\u00a0Exposes Puppet-specific intelligence through MCP, enabling GitHub Copilot to better generate Puppet solutions.\u00a0\u00a0<\/li>\n<\/ul>\n\n<p>The MCP server provides\u00a0<a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/available-mcp-tools-for-code-assist.htm\" rel=\"noopener noreferrer\">several tools<\/a>\u00a0to provide Puppet language guides, information about Puppet environment entities, Puppet documentation, and networking info. This integration eliminates context switching between documentation, terminal windows, and code editors and provides the information required by AI agents to support smooth transitions from one step to the next.\u00a0\u00a0<\/p>\n\n<p>Authentication to the Puppet MCP server happens via Puppet Enterprise (PE) API keys with\u00a0<a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/adding-an-mcp-server.htm\" rel=\"noopener noreferrer\">secure token storage in VS Code<\/a>. The MCP architecture follows a client-server model where VS Code instantiates client connections to the Puppet MCP server running in your Puppet Enterprise environment.<\/p>\n\n<h2>\n  \n  \n  Prerequisites and Required Software Installation\u00a0\n<\/h2>\n\n<p>This brief tutorial is based on the assumption that you have met several prerequisites. Plan time to go through this checklist before starting:\u00a0<\/p>\n\n<ul>\n<li>  Obtain your authentication credentials to download Perforce Puppet applications. The credentials are either your Forge API key or your\u00a0<a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/verify_installed_licenses_and_active_nodes.htm?Highlight=%22license%20id%22\" rel=\"noopener noreferrer\">Puppet Enterprise license ID<\/a>.\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/installing.htm\" rel=\"noopener noreferrer\">Install Puppet Enterprise Advanced 2025.7+<\/a>.\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/enabling-the-infra-assistant.htm\" rel=\"noopener noreferrer\">Enable the Infra Assistant feature on your PE server<\/a>. You do not have to configure the Infra Assistant OpenAI settings, but the Infra Assistant must be turned on in order for the MCP server to accept requests from your agent.\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/rbac-token-auth-generate-token-console.htm\" rel=\"noopener noreferrer\">Generate a valid Puppet Enterprise API key<\/a>\u00a0from the console for a user with the\u00a0<code>infrastructure_assistant:use<\/code>\u00a0permission. (The API key is sometimes called a token.)<\/li>\n<li>  Install\u00a0<a href=\"https:\/\/code.visualstudio.com\/download\" rel=\"noopener noreferrer\">Visual Studio Code<\/a>\u00a0on your development machine and complete configuration tasks:\u00a0<\/li>\n<li>  <a href=\"https:\/\/code.visualstudio.com\/docs\/copilot\/overview#_getting-started\" rel=\"noopener noreferrer\">Configure the GitHub Copilot extension<\/a>\u00a0in Visual Studio Code.\u00a0<\/li>\n<li>  Configure GitHub Copilot to\u00a0<a href=\"https:\/\/code.visualstudio.com\/docs\/copilot\/customization\/mcp-servers\" rel=\"noopener noreferrer\">use MCP servers in VS Code<\/a>.\u00a0<\/li>\n<li>  Ensure that your developer machine has network access to the PE console host.\u00a0<\/li>\n<li>  Verify that your developer machine\u00a0<a href=\"https:\/\/portal.perforce.com\/s\/article\/8078496522135?utm_medium=social&amp;utm_source=youtube&amp;utm_campaign=2025-puppet-forge&amp;utm_content=puppet-forge\" rel=\"noopener noreferrer\">trusts the PE console CA certificate<\/a>.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Tutorial Walkthrough: From Empty Repository to Generated Module\u00a0\n<\/h2>\n\n<p>These steps walk through how you can take a completely empty repository to a validated Puppet module by using an AI-assisted flow in Visual Studio with a code assistant. Remember to meet the previously listed prerequisites! The following steps use GitHub Copilot, but if you happen to use a different stack (like Claude Code or Cursor), the process is mostly the same.\u00a0\u00a0<\/p>\n\n<p><strong>Tip:<\/strong>\u00a0In this tutorial, \u201cagent chat\u201d refers to the GitHub Copilot Agent chat window in Visual Studio Code.\u00a0<\/p>\n\n<ol>\n<li> Using your favorite source control tool, create a blank repository to begin working.\u00a0<\/li>\n<li> Clone the repository and open it in Visual Studio Code.\u00a0<\/li>\n<li> To support the use of Puppet tools, install GitHub Copilot instructions in your solution. Sample instructions are\u00a0<a href=\"https:\/\/github.com\/jst-cyr\/puppet-copilot-instructions-example\" rel=\"noopener noreferrer\">available on GitHub<\/a>.\u00a0\n<strong>Tip:<\/strong>\u00a0Some models cannot easily find instructions in subfolders and\u00a0 search only in the root directory. Some models look only for the\u00a0<code>copilot-instructions.md<\/code>\u00a0file. The example provides a\u00a0<code>README.md<\/code>\u00a0and a\u00a0<code>copilot-instructions.md<\/code>\u00a0file that help lead the model toward the custom Puppet instructions file.\u00a0\u00a0<\/li>\n<li> <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/adding-an-mcp-server.htm\" rel=\"noopener noreferrer\">Add the Puppet MCP server<\/a>\u00a0to your\u00a0<code>mcp.json<\/code>\u00a0file.\u00a0<\/li>\n<li> Start the Puppet MCP server, either by clicking\u00a0<strong>Start<\/strong>\u00a0in your\u00a0<code>mcp.json<\/code>\u00a0file or through the\u00a0<strong>MCP Servers \u2013 Installed<\/strong>\u00a0list in the\u00a0<strong>Extensions<\/strong>\u00a0view.\u00a0<\/li>\n<li> Open an agent chat window for GitHub Copilot.\u00a0<\/li>\n<li> Run a prompt to generate a new module. For example: \u201cI want to create a new Puppet module to automate the provisioning of new AWS VMs. Please follow best practices for Puppet module creation.\u201d\u00a0<\/li>\n<\/ol>\n\n<p>Note that this is a simple prompt example. To follow context engineering best practices, you would provide much more detail to get your desired output. For tutorial purposes, the prompt is intentionally lightweight. By using a simple prompt, you can recognize the extra context and benefits provided by Puppet tools to accelerate your progress.<\/p>\n\n<p>  <iframe src=\"https:\/\/www.youtube.com\/embed\/F25NUANJT04\">\n  <\/iframe>\n<\/p>\n\n<h2>\n  \n  \n  Installing Puppet Development Kit (PDK)\u00a0\n<\/h2>\n\n<p>At this point, your agent should be running and attempting to solve the problem. The agent will quickly detect the need for \u00a0additional information from the\u00a0<strong>Puppet MCP server.<\/strong>\u00a0In addition, the agent will determine that the\u00a0<strong>Puppet Development Kit (PDK)<\/strong>\u00a0must be used to create modules. In my model testing, the GitHub Copilot agent undertook the following tasks, which required minimal input from the user:\u00a0<\/p>\n\n<ol>\n<li> Processed the provided Puppet instructions and determined that the Puppet MCP server should be connected to retrieve guidelines.\u00a0<\/li>\n<li> Attempted to connect to the Puppet MCP server for the\u00a0<code>get_puppet_guide<\/code>\u00a0tool and augmented the context with information from the Puppet MCP server.\u00a0<\/li>\n<li> Recognized that the PDK is required and attempted to check whether PDK was installed (by running\u00a0<code>pdk --version<\/code>).\u00a0<\/li>\n<li>\n<p>If PDK was not detected, attempted to fetch the PDK installation instructions.\u00a0<\/p>\n\n<p><strong>Tip:<\/strong>\u00a0The agent may use different URLs to search for the PDK installation instructions. Eventually, the agent will find the correct installation instructions for the operating system.\u00a0<\/p>\n<\/li>\n<li><p>After the agent discovered the installation instructions, the agent determined that authentication credentials are required to download the software. At this point, the user would be prompted for Forge credentials or Puppet Enterprise credentials. At the prompt, you will specify the type of credentials. For example: \u201cHere is my license ID: abcdefghizjklmnopzrstuvwxyz1\u201d. This sample prompt informs the agent to use a Puppet Enterprise license ID, instead of a Forge API key, as the authentication method.\u00a0<\/p><\/li>\n<li><p>Submit the prompt and the agent will begin to download and install the PDK.\u00a0<\/p><\/li>\n<\/ol>\n\n<p>The agent typically installs the PDK as part of its setup routine. In practice, the agent might run incorrect commands or fail to use elevated privileges on the first attempt. When that happens, allow the agent to iterate until the installation succeeds.\u00a0<\/p>\n\n<p>\ud83d\udca1\u00a0<strong>Tip:<\/strong>\u00a0This is a huge boost for new users because the agent can search for instructions and quickly iterate through installation failures, while you focus on reviewing the results.\u00a0<\/p>\n\n<p>After the agent successfully completes the PDK download and installation on your behalf, the agent continues with module generation.<\/p>\n\n<h2>\n  \n  \n  Generating the Module\u00a0\n<\/h2>\n\n<p>With the PDK installed, it\u2019s time to create the first steps of a module that will accomplish your goals. Only minimal context is provided in the tutorial example for provisioning new AWS VMs. The models will attempt to create the functionality you require based on their training data, the context from the Puppet MCP server, and the context you provide. The better your prompting, the more accurate the output will be. For this tutorial, however, assume that you are not trying to generate the module in one step and will follow up with further prompting to refine the module. During this tutorial step, the agent will generate the basics of the module.\u00a0<\/p>\n\n<p>At this stage, GitHub Copilot typically performs the following actions without requiring additional prompts:\u00a0<\/p>\n\n<ol>\n<li> After completing installation, validates the installation by running\u00a0<code>pdk --version<\/code>.\u00a0<\/li>\n<li> If successful, creates a module with a PDK command like\u00a0<code>pdk new module aws_provisioning --skip-interview<\/code>.\u00a0<\/li>\n<li> After the PDK module creation logic completes processing, creates profile classes for AWS VM provisioning. This command might be\u00a0<code>pdk new class aws_provisioning<\/code>\u00a0or similar.\u00a0<\/li>\n<li> Creates additional supporting classes. In my testing, the agent ran these additional commands:\u00a0\n\n<ol>\n<li> <code>pdk new class aws_provisioning::config<\/code>\u00a0<\/li>\n<li> <code>pdk new class aws_provisioning::instance<\/code>\u00a0<\/li>\n<\/ol>\n\n\n<\/li>\n\n<li> After the basic structure of the classes is in place, begins implementing Puppet code for the classes. The actions resemble typical code generation steps, creating and editing a variety of files and patching them with new implementation logic.\u00a0<\/li>\n\n<li> When the initial code generation is completed on top of the PDK skeleton implementations, updates documentation such as the\u00a0<code>metadata.json<\/code>\u00a0file and the README file to match the needs of the generated code.\u00a0<\/li>\n\n<\/ol>\n\n<p>When documentation updates are completed, a typical agent might stop without validating further. However, by setting the context for the agent with knowledge of PDK and its capabilities as well as the best practices from the Puppet MCP server, the agent knows that validation of modules is an important next step.<\/p>\n\n<h2>\n  \n  \n  Validating the Module\u00a0\n<\/h2>\n\n<p>PDK supports validation of a module to ensure that it meets specific standards. Even with the best practices and instructions that were provided to the agent, along with its training, agents can make mistakes. With validation, you can catch some of these mistakes up front. Augmenting with tools is a key strategy for agentic workflows. Using the agent as an automation process to leverage the tools you have is a great way to take advantage of more deterministic capabilities along with the non-deterministic nature of the agentic automation.\u00a0<\/p>\n\n<ol>\n<li> For validation, the agent should attempt to use the PDK:\u00a0<code>pdk validate<\/code>\n<\/li>\n<li> PDK should find issues, even if they are only indentation issues in YAML files. The agent should then attempt to correct the issues with code assist using the output of the PDK validation.\u00a0<\/li>\n<li> When the patch edits are complete, the agent should run PDK validation again (<code>pdk validate<\/code>).<\/li>\n<\/ol>\n\n<p>If more issues are found, the agent should circle back and try to resolve them, looping until no more issues are found, but typically the first run of validation should find all issues.\u00a0<\/p>\n\n<p>You can now continue your own testing and building out the module with a solid base that follows Puppet best practices! This workflow compresses the traditional learning curve and gets you to the interesting bits of your development much faster.<\/p>\n\n<h2>\n  \n  \n  Key Benefits of Agent-Assisted Module Creation\u00a0\n<\/h2>\n\n<p>This AI-assisted approach offers several key advantages over manual development:\u00a0<\/p>\n\n<ul>\n<li>  Agent-led requirements detection and installation help you get started so that your system achieves a correct state.\u00a0<\/li>\n<li>  Autonomous error detection and correction reduce debugging time significantly.\u00a0<\/li>\n<li>  The agent's ability to reference the Puppet MCP server and official Puppet documentation helps to ensure that generated code follows best practices and coding standards.\u00a0\u00a0<\/li>\n<li>  Integration with PDK tooling provides deterministic automation and continuous quality checks throughout the development process.\u00a0\u00a0<\/li>\n<li>  Structured instruction files create a consistent and repeatable development experience across different projects and team members.\u00a0<\/li>\n<\/ul>\n\n<p>By building your AI-assisted flow on top of solid DevOps tools and practices, you\u2019ll be equipped to avoid the typical challenges faced by generic coding models.\u00a0<\/p>\n\n<blockquote>\n<p><em><strong>\u201cDevOps is not dying. It is becoming the economic and operational foundation for AI at scale.<\/strong><\/em>\u00a0<\/p>\n\n<p><em><strong>The data shows the same pattern across every domain: AI succeeds when delivery systems are standardized, centralized, automated, and measurable. Where those foundations are weak, AI magnifies existing gaps in coordination, governance, auditability, cost, and outcomes.\u201d<\/strong><\/em>\u00a0<br><br>\n<em><strong>-<\/strong><\/em>\u00a0<a href=\"https:\/\/www.perforce.com\/resources\/state-of-devops\/conclusion?utm_medium=social&amp;utm_source=youtube&amp;utm_campaign=2025-puppet-forge&amp;utm_content=puppet-forge\" rel=\"noopener noreferrer\"><em><strong>State of DevOps Report 2026<\/strong><\/em><\/a><\/p>\n<\/blockquote>\n\n<h2>\n  \n  \n  Challenges and Solutions in AI-Assisted Puppet Development\u00a0\n<\/h2>\n\n<p>You might encounter a few common challenges when using AI agents for Puppet module generation:\u00a0<\/p>\n\n<ol>\n<li> According to a\u00a0<a href=\"https:\/\/vercel.com\/blog\/agents-md-outperforms-skills-in-our-agent-evals\" rel=\"noopener noreferrer\">recent evaluation by Vercel<\/a>, coding agents\u00a0<strong>ignore available skills in 56% of cases,<\/strong>\u00a0choosing not to invoke skills even when relevant documentation exists. The solution involves using instruction files that force context loading rather than relying on agent decisions. In the evaluation, Vercel found that directly embedding a compressed 8 KB docs index into an\u00a0<code>AGENTS.md<\/code>\u00a0file helped coding agents achieve 100% pass rates compared to 79% with skills combined with explicit instructions. In my own tests with GitHub Copilot, references from the README.md file to other instruction files helped the agent, with less sophisticated models, to find the correct instructions and load them.<\/li>\n<li> <strong>Agents sometimes refuse to use PDK or read proper installation instructions<\/strong>, requiring iterative prompt refinement. The solution involves adding explicit installation commands, troubleshooting steps, and URL references to your\u00a0<code>copilot-instructions.md<\/code>\u00a0file. Ensure that you follow\u00a0<a href=\"https:\/\/vercel.com\/blog\/agents-md-outperforms-skills-in-our-agent-evals\" rel=\"noopener noreferrer\">best practices for instructions files to keep them lean<\/a>. Getting GitHub Copilot to consistently read instruction files requires understanding that passive context (always-loaded files) outperforms active retrieval (on-demand skills). Instruction files should be concise (fewer than 1,000 lines), structured with headings and bullet points, and use imperative rules rather than long paragraphs. \u00a0<\/li>\n<li> <strong>AI agents can get stuck in validation and fixing loops.<\/strong>\u00a0For linting and validation errors that agents struggle to fix, adding error-specific guidance to instruction files helps GitHub Copilot learn from mistakes. The goal is to eliminate decision points by providing persistent context rather than making agents decide when to look up information.<\/li>\n<\/ol>\n\n<h3>\n  \n  \n  Table 1: Common challenges in AI-assisted Puppet module development and recommended solutions\u00a0\n<\/h3>\n\n<div class=\"table-wrapper-paragraph\"><table>\n<thead>\n<tr>\n<th>Challenge\u00a0<\/th>\n<th>Impact\u00a0<\/th>\n<th>Solution\u00a0<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Agents ignore MCP tools (56% of cases)\u00a0<\/td>\n<td>Skills documentation not invoked when needed\u00a0<\/td>\n<td>Use .github\/copilot-instructions.md for passive context loading (achieves 100% pass rate versus 79% with on-demand skills).\u00a0<\/td>\n<\/tr>\n<tr>\n<td>PDK installation issues\u00a0<\/td>\n<td>Agents fail to use PDK or read installation instructions\u00a0<\/td>\n<td>Add explicit installation commands and troubleshooting steps to copilot-instructions.md.\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Inconsistent reading of instruction files\u00a0<\/td>\n<td>Agent decisions create unpredictable behavior\u00a0<\/td>\n<td>Provide persistent context (always-loaded files) rather than relying on agent retrieval decisions.\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Incorrect Puppet code or missing namespaces or invalid spacing\u00a0<\/td>\n<td>Generated configurations fail validation\u00a0<\/td>\n<td>Include specific vendor configuration examples in instruction files and use PDK validation for testing modules.\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Validation errors agents can't fix\u00a0<\/td>\n<td>Repeated mistakes across generations\u00a0<\/td>\n<td>Document error-specific guidance in instruction files so agents learn from past failures.\u00a0<\/td>\n<\/tr>\n<tr>\n<td>File structure guidelines\u00a0<\/td>\n<td>Keep instruction files concise (fewer than 1,000 lines) with clear structure\u00a0<\/td>\n<td>Use headings, bullet points, and imperative rules instead of long paragraphs.<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n\n<h2>\n  \n  \n  Should You Use Agent Skills or Instructions?\u00a0\n<\/h2>\n\n<p>Vercel's research on AI agent instruction approaches provides compelling evidence to show why instruction files are essential for effective AI-assisted development. Their evaluation tested Next.js 16 API generation using four configurations:\u00a0\u00a0<\/p>\n\n<ol>\n<li> No documentation: 53% pass rate\u00a0<\/li>\n<li> Skills with default behavior: 53% pass rate, same as no documentation\u00a0<\/li>\n<li> Skills with explicit trigger instructions: 79% pass rate\u00a0<\/li>\n<li> A compressed 8 KB docs index in AGENTS.md: 100% pass rate\u00a0<\/li>\n<\/ol>\n\n<p>The static markdown file outperformed sophisticated retrieval systems because the file eliminated decision points where agents must choose whether to invoke tools. In 56% of eval cases, skills were never invoked despite being available, producing no improvement over the baseline.\u00a0<\/p>\n\n<h3>\n  \n  \n  <a href=\"https:\/\/www.puppet.com\/sites\/default\/files\/inline-images\/2_0.png\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa7z7h9xf8dwzhnxwauiq.png\" alt=\"AI Agent Performance: Instruction Approach comparison\" width=\"800\" height=\"450\"><\/a>\n<\/h3>\n\n<p>Although these findings were focused on web development frameworks like Next.js, similar issues occur with agents across language frameworks and IDEs. For Puppet development, my testing found that combining instructions, PDK tooling, and the Puppet MCP server gave agents the best chance to have the correct context information. \u00a0<\/p>\n\n<p>AI-assisted development is still evolving but is expected to become an important part of many DevOps team processes. The Model Context Protocol is establishing itself as an enterprise-wide standard enabling vendor interoperability, with companies like Figma, Notion, Linear, Atlassian, and MongoDB building MCP servers that work seamlessly together.\u00a0<\/p>\n\n<p>For infrastructure-as-code specifically, the shift toward \u201cvibe coding\u201d is opening up the opportunity for developers to express intentions in natural language rather than memorizing command-line syntax or the specifics of the Puppet Desired State Language (DSL). \u00a0Given a solid base of DevOps tools across the lifecycle, from development to testing to operations, coding assistants are well positioned to take advantage of these tools, thus unlocking opportunities for more practitioners to achieve greater efficiency across the entire workflow.<\/p>\n\n<h2>\n  \n  \n  References\u00a0\n<\/h2>\n\n<p>Check out the following sources, some of which were referenced in the document, and some of which provide a deeper dive if this topic is of interest to you!\u00a0<\/p>\n\n<ul>\n<li>  <a href=\"https:\/\/github.com\/jst-cyr\/puppet-copilot-instructions-example\" rel=\"noopener noreferrer\">Sample instructions for GitHub Copilot and Puppet MCP server<\/a>\u00a0(github.com\/jst-cyr)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/installing.htm\" rel=\"noopener noreferrer\">Installing Puppet Enterprise (PE)<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/infra-assistant-code-assist.htm\" rel=\"noopener noreferrer\">Infra Assistant: code assist<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/enabling-the-infra-assistant.htm\" rel=\"noopener noreferrer\">Infra Assistant: Enable the Infra Assistant<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/available-mcp-tools-for-code-assist.htm\" rel=\"noopener noreferrer\">Infra Assistant - code assist: Available MCP tools<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/configuring-your-client-to-use-the-mcp-server.htm\" rel=\"noopener noreferrer\">Infra Assistant - code assist: Configuring your client to use the MCP server<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/adding-an-mcp-server.htm\" rel=\"noopener noreferrer\">Infra Assistant - code assist: Add the Puppet MCP server<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/rbac-token-auth-generate-token-console.htm\" rel=\"noopener noreferrer\">SAML authentication: Generate a token in the console<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/verify_installed_licenses_and_active_nodes.htm\" rel=\"noopener noreferrer\">View your license details | Puppet Enterprise<\/a>\u00a0(help.puppet.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/portal.perforce.com\/s\/article\/8078496522135?utm_medium=social&amp;utm_source=youtube&amp;utm_campaign=2025-puppet-forge&amp;utm_content=puppet-forge\" rel=\"noopener noreferrer\">Get the Puppet CA certificate chain in Puppet Enterprise<\/a>\u00a0(portal.perforce.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/www.puppet.com\/blog\/puppet-edge-code-assist\" rel=\"noopener noreferrer\">Build Tasks for Network Devices Faster with Code Assistance and Puppet Edge<\/a>\u00a0(puppet.com)\u00a0\u00a0<\/li>\n<li>  <a href=\"https:\/\/www.perforce.com\/resources\/state-of-devops?utm_medium=social&amp;utm_source=youtube&amp;utm_campaign=2025-puppet-forge&amp;utm_content=puppet-forge\" rel=\"noopener noreferrer\">The State of DevOps Report 2026<\/a>\u00a0(perforce.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/vercel.com\/blog\/agents-md-outperforms-skills-in-our-agent-evals\" rel=\"noopener noreferrer\">AGENTS.md\u202foutperforms skills in our agent evals<\/a>\u00a0(vercel.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/code.visualstudio.com\/docs\/copilot\/customization\/mcp-servers\" rel=\"noopener noreferrer\">GitHub Copilot: Use MCP servers in VS Code<\/a>\u00a0(code.visualstudio.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/code.visualstudio.com\/docs\/copilot\/overview\" rel=\"noopener noreferrer\">GitHub Copilot in VS Code<\/a>\u00a0(code.visualstudio.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/docs.github.com\/en\/copilot\/tutorials\/use-custom-instructions\" rel=\"noopener noreferrer\">Using custom instructions to unlock the power of Copilot code review<\/a>\u00a0(docs.github.com)\u00a0<\/li>\n<li>  <a href=\"https:\/\/dev.to\/razvan_dim\/bridging-the-gap-a-deep-dive-into-the-model-context-protocol-mcp-4e0p\">Bridging the Gap: A Deep Dive into the Model Context Protocol (MCP)<\/a>\u00a0(dev.to)<\/li>\n<\/ul>\n\n","category":["puppet","githubcopilot","vscode","aiops"]},{"title":"Installing PDK on a Linux Workstation (Manual Edition)","pubDate":"Sat, 11 Apr 2026 19:05:38 +0000","link":"https:\/\/dev.to\/souldo\/installing-pdk-on-a-linux-workstation-manual-edition-7ao","guid":"https:\/\/dev.to\/souldo\/installing-pdk-on-a-linux-workstation-manual-edition-7ao","description":"<p>Getting PDK installed and updated can be a bit...<em>weird<\/em> these days, and after running into a few bumps I thought I'd share my compiled notes that streamlined a few different pages in the Puppet help documentation. Note: this is for manual setup. At some point I'll add the super fun Puppet version of this to make it simple and automated.<\/p>\n\n<h2>\n  \n  \n  Prerequisites\n<\/h2>\n\n<ul>\n<li>One of the following: a Puppet Core license, a Puppet Enterprise License, a Puppet Core development license.<\/li>\n<li>a Linux workstation. In this example I'm working with Fedora 33.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Steps\n<\/h2>\n\n<h3>\n  \n  \n  1. Gather Your Credentials\n<\/h3>\n\n<p>First things first, let's get our credentials in order.<\/p>\n\n<h4>\n  \n  \n  For Puppet Enterprise users:\n<\/h4>\n\n<p>The username is <strong>license-id<\/strong>. The password can be found via the PE console. Log into the console, click on <strong>License<\/strong> in the left side menus and then click <strong>Copy license id<\/strong>.<\/p>\n\n<h4>\n  \n  \n  For Puppet Core users:\n<\/h4>\n\n<p>The username is <strong>forge-key<\/strong>. The password can be found and\/or created by logging into the Puppet Forge. Click on your account at the upper right corner and select <strong>View Profile<\/strong>. On the left side, select <strong>API Keys<\/strong>. Generate an API key and copy the key. That is your password. Make a note to save this for future use as once you leave that page you'll have to create a new one if you forget it.<\/p>\n\n<h3>\n  \n  \n  2. Download and Setup the Repository File\n<\/h3>\n\n<p>First, let's grab the repository. You can find the relevant RPM or DEB from either <a href=\"\/\/yum-puppetcore.puppet.com\/public\">yum-puppetcore.puppet.com\/public<\/a> or <a href=\"\/\/apt-puppetcore.puppet.com\/public\">apt-puppetcore.puppet.com\/public<\/a>. Once you've found the right one, let's download and install!<br>\n<\/p>\n\n<div class=\"highlight js-code-highlight\">\n<pre class=\"highlight shell\"><code>wget https:\/\/yum-puppetcore.puppet.com\/public\/puppet8-release-el-9.noarch.rpm\n\n<span class=\"nb\">sudo <\/span>rpm <span class=\"nt\">-ivh<\/span> puppet8-release-el-8-noarch.rpm\n<\/code><\/pre>\n\n<\/div>\n\n\n\n<p>Once you've done the above, you'll be able to edit the repo file at \/etc\/yum.repos.d\/puppet8-release.repo. Let's take a look at the contents:<br>\n<\/p>\n\n<div class=\"highlight js-code-highlight\">\n<pre class=\"highlight ini\"><code><span class=\"nn\">[puppet8]<\/span>\n<span class=\"py\">name<\/span><span class=\"p\">=<\/span><span class=\"s\">Puppet 8 Repository el 8 - $basearch<\/span>\n<span class=\"py\">baseurl<\/span><span class=\"p\">=<\/span><span class=\"s\">https:\/\/yum-puppetcore.puppet.com\/puppet8\/el\/8\/$basearch<\/span>\n<span class=\"py\">gpgkey<\/span><span class=\"p\">=<\/span><span class=\"s\">file:\/\/\/etc\/pki\/rpm-gpg\/RPM-GPG-KEY-puppet8-release<\/span>\n<span class=\"py\">enabled<\/span><span class=\"p\">=<\/span><span class=\"s\">1<\/span>\n<span class=\"py\">gpgcheck<\/span><span class=\"p\">=<\/span><span class=\"s\">1<\/span>\n\n<span class=\"c\">## Add authentication here by uncommenting and filling in values\n<\/span>\n<span class=\"c\">#username=&lt;api_user&gt;\n#password=&lt;api_key&gt;\n<\/span><\/code><\/pre>\n\n<\/div>\n\n\n\n<p>It's pretty straightforward here. Remove the <code>#<\/code> from username and password, then copy your username and password from above into the <code>&lt;api_user&gt;<\/code> and <code>&lt;api_key&gt;<\/code> spaces, respectively. Save and quit editing the file.<\/p>\n\n<h3>\n  \n  \n  3. Update and Install\n<\/h3>\n\n<p>At this point we have our repo file, we have our credentials configured and we just need to update the repos and install pdk. a simple <code>yum update<\/code> followed by <code>yum install pdk<\/code> should get us there.<br>\n<\/p>\n\n<div class=\"highlight js-code-highlight\">\n<pre class=\"highlight console\"><code><span class=\"gp\">root@choplifter:\/home\/matthew#<\/span><span class=\"w\"> <\/span>yum update\n<span class=\"go\">Updating and loading repositories:\n Puppet 8 Repository el 8 - x86_64            100% |  14.2 KiB\/s |  14.1 KiB |  00m01s\nRepositories loaded.\nNothing to do.\n<\/span><span class=\"gp\">root@choplifter:\/home\/matthew#<\/span><span class=\"w\"> <\/span>yum <span class=\"nb\">install <\/span>pdk\n<span class=\"go\">Updating and loading repositories:\nRepositories loaded.\nPackage                   Arch     Version                    Repository          Size\nInstalling:\n pdk                      x86_64   3.6.1.1-1.el9              puppet8        223.8 MiB\n\nTransaction Summary:\n Installing:         1 package\n\nTotal size of inbound packages is 57 MiB. Need to download 57 MiB.\nAfter this operation, 224 MiB extra will be used (install 224 MiB, remove 0 B).\nIs this ok [y\/N]: Y\n[1\/1] pdk-0:3.6.1.1-1.el9.x86_64              100% |  15.8 MiB\/s |  57.0 MiB |  00m04s\n--------------------------------------------------------------------------------------\n[1\/1] Total                                   100% |  15.8 MiB\/s |  57.0 MiB |  00m04s\nRunning transaction\nImporting OpenPGP key 0x9E61EF26:\n<\/span><span class=\"gp\"> UserID     : \"Puppet, Inc. Release Key (Puppet, Inc. Release Key) &lt;release@puppet.com&gt;<\/span><span class=\"s2\">\"\n<\/span><span class=\"go\"> Fingerprint: D6811ED3ADEEB8441AF5AA8F4528B6CD9E61EF26\n From       : file:\/\/\/etc\/pki\/rpm-gpg\/RPM-GPG-KEY-puppet8-release\nIs this ok [y\/N]: Y\nThe key was successfully imported.\n[1\/3] Verify package files                    100% |   5.0   B\/s |   1.0   B |  00m00s\n[2\/3] Prepare transaction                     100% |   3.0   B\/s |   1.0   B |  00m00s\n[3\/3] Installing pdk-0:3.6.1.1-1.el9.x86_64   100% |  72.0 MiB\/s | 228.5 MiB |  00m03s\nComplete!\n\n<\/span><span class=\"gp\">root@choplifter:\/home\/matthew#<\/span><span class=\"w\"> <\/span>pdk <span class=\"nt\">--version<\/span>\n<span class=\"go\">3.6.1\n<\/span><\/code><\/pre>\n\n<\/div>\n\n\n\n<p>That's all there is to it! As an added bonus, this is the same repo for Bolt and all the Puppet Core bits, so if you need the agent on your box it's as easy as another <code>yum install<\/code>.<\/p>\n\n<p>Or dnf. Whatever.<\/p>\n\n","category":["puppet","pdk","linux"]},{"title":"ConfDroid Puppet Modules - Selinux","pubDate":"Sat, 11 Apr 2026 10:04:51 +0000","link":"https:\/\/dev.to\/12ww1160\/confdroid-puppet-modules-selinux-4im3","guid":"https:\/\/dev.to\/12ww1160\/confdroid-puppet-modules-selinux-4im3","description":"<h2>\n  \n  \n  Introducing confdroid_selinux: Declarative SELinux Management for Your Rocky 9 Servers\n<\/h2>\n\n<p>Security-Enhanced Linux (SELinux) is one of the most powerful built-in defenses on modern Linux systems. Unlike traditional permission-based security (user\/group\/other), SELinux adds <strong>mandatory access control (MAC)<\/strong> at the kernel level. It labels every process, file, directory, and network port with a security context and enforces strict policies that say exactly what each subject is allowed to do with each object \u2014 no matter what the file permissions say.<\/p>\n\n<p>This means even if an attacker gains root or tricks a service into writing a malicious file, SELinux can still block the attack because the file simply doesn\u2019t have the right context.<br>\nMany enterprise Linux distributions enable SELinux <strong>by default<\/strong> in enforcing mode on fresh installs:<\/p>\n\n<ul>\n<li>Rocky Linux 9<\/li>\n<li>AlmaLinux 9<\/li>\n<li>Red Hat Enterprise Linux (RHEL) 9<\/li>\n<li>Fedora<\/li>\n<\/ul>\n\n<p>On these systems, SELinux is not an afterthought \u2014 it\u2019s a core part of the security model.<\/p>\n\n<h2>\n  \n  \n  How SELinux Stops Real-World Attacks\n<\/h2>\n\n<p>Imagine an attacker sends a phishing email with a malicious script disguised as a legitimate configuration file. The user (or a compromised service) downloads and places the file in <code>\/tmp<\/code> or a web directory.<\/p>\n\n<p>Without SELinux:<\/p>\n\n<ul>\n<li>If the file has execute permissions, the attacker might be able to run it.<\/li>\n<\/ul>\n\n<p>With SELinux (enforcing mode):<\/p>\n\n<ul>\n<li>The file gets created with the wrong security context (for example, <code>user_tmp_t<\/code> instead of <code>httpd_exec_t<\/code>).<\/li>\n<li>Even if the attacker somehow makes the file executable, SELinux denies execution or access because the policy doesn\u2019t allow it.<\/li>\n<li>The attack is stopped cold, and an audit log entry is generated.<\/li>\n<\/ul>\n\n<p>SELinux turns potential disasters into harmless denied operations.<\/p>\n\n<h2>\n  \n  \n  The Problem with Manual SELinux Management\n<\/h2>\n\n<p>While SELinux is powerful, managing it consistently across many servers is painful:<\/p>\n\n<ul>\n<li>Forgetting to run <code>restorecon<\/code> after placing files<\/li>\n<li>Accidentally setting the wrong mode (setenforce)<\/li>\n<li>Configuration drift between hosts<\/li>\n<\/ul>\n\n<p>That\u2019s exactly why I built <strong>confdroid_selinux<\/strong>.<\/p>\n\n<h2>\n  \n  \n  What confdroid_selinux Does\n<\/h2>\n\n<p>This new Puppet 8 module (tested on Rocky 9) gives you full declarative control over SELinux:<\/p>\n\n<ul>\n<li>Installs all required SELinux tools and binaries<\/li>\n<li>Manages the main configuration file <code>\/etc\/sysconfig\/selinux<\/code> with correct permissions and SELinux contexts<\/li>\n<li>Controls the global SELinux mode (enforcing or permissive) \u2014 the Puppet equivalent of setenforce<\/li>\n<li>Ensures every file and directory managed by other Confdroid modules receives the proper SELinux context<\/li>\n<li>Works cleanly on enforcing-mode systems<\/li>\n<\/ul>\n\n<p>All other Confdroid modules (see the <a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/puppet_collection\" rel=\"noopener noreferrer\">full collection overview<\/a>) already include proper SELinux context handling:<\/p>\n\n<ul>\n<li>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_apache\" rel=\"noopener noreferrer\">confdroid_apache<\/a>,<\/li>\n<li>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_gitea\" rel=\"noopener noreferrer\">confdroid_gitea<\/a>,<\/li>\n<li>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_php\" rel=\"noopener noreferrer\">confdroid_php<\/a>,<\/li>\n<li>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_php\" rel=\"noopener noreferrer\">confdroid_fail2ban<\/a>,<\/li>\n<li>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_automatic\" rel=\"noopener noreferrer\">confdroid_automatic<\/a>,<\/li>\n<li>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_nrpe\" rel=\"noopener noreferrer\">confdroid_nrpe<\/a>,<\/li>\n<li>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_nagios\" rel=\"noopener noreferrer\">confdroid_nagios<\/a>,<\/li>\n<\/ul>\n\n<p>and many more.<\/p>\n\n<p>They work even better when <code>**confdroid_selinux**<\/code> is present, because the global policy and mode are managed in one place.<\/p>\n\n<h2>\n  \n  \n  SELinux Management Flow with the Module\n<\/h2>\n\n<p>Here\u2019s how the module turns your Puppet run into reliable SELinux enforcement:<\/p>\n\n<p><a href=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F20z827cy5qyeoyp8iecz.png\" class=\"article-body-image-wrapper\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F20z827cy5qyeoyp8iecz.png\" alt=\"Mermaid diagram\" width=\"542\" height=\"1166\"><\/a><\/p>\n\n<h2>\n  \n  \n  Easy Deployment\n<\/h2>\n\n<ul>\n<li>\n<strong>Simple inclusion<\/strong>:\nin your site.pp or nodes.pp:\n<\/li>\n<\/ul>\n\n<div class=\"highlight js-code-highlight\">\n<pre class=\"highlight puppet\"><code><span class=\"k\">include<\/span> <span class=\"nc\">confdroid_selinux<\/span>\n<\/code><\/pre>\n\n<\/div>\n\n\n\n<ul>\n<li>\n<strong>with Foreman (recommended)<\/strong>:<\/li>\n<\/ul>\n\n<p>Add the <code>confdroid_selinux::params<\/code> class to the host or host group and override parameters (mode, etc.) as smart class parameters.<\/p>\n\n<blockquote>\n<p>Important notes:<br>\nTest in a non-production environment first.<br>\nIf you are switching from disabled to enforcing mode, a reboot is required (the module does not reboot automatically to avoid surprises).<\/p>\n<\/blockquote>\n\n<p>You can find the full module, source code, and parameter reference here:<br>\n<a href=\"https:\/\/sourcecode.confdroid.com\/confdroid\/confdroid_selinux\" rel=\"noopener noreferrer\">\u2192<\/a><\/p>\n\n<h2>\n  \n  \n  Final Thoughts\n<\/h2>\n\n<p>SELinux is no longer optional on modern enterprise Linux. With <code>confdroid_selinux<\/code>, you get consistent, version-controlled, and fully automated SELinux management that works hand-in-hand with the rest of the Confdroid collection.<br>\nYour servers stay secure by default \u2014 even when things go wrong elsewhere.<br>\nHave you been running SELinux in enforcing mode across your fleet, or are you still in permissive because of management headaches? Would you like to see more advanced features (custom Booleans, custom modules, etc.) in a future version? Let me know in the comments!<\/p>\n\n\n\n\n<p>Did you find this post helpful?  You can support me.<\/p>\n\n<p><a href=\"https:\/\/www.buymeacoffee.com\/grizzly_coda\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2znn4km0i2jib7ru1sm9.png\" alt=\"\" width=\"170\" height=\"37\"><\/a><\/p>\n\n<p><a href=\"https:\/\/hetzner.cloud\/?ref=EY14C8Tema9j\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyab43i0ysz9uwuq267u0.png\" alt=\"Hetzner Referral\" width=\"400\" height=\"37\"><\/a><\/p>\n\n<p><a href=\"https:\/\/confdroid.substack.com\/subscribe?params=%5Bobject%20Object%5D\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9r49xyl05rwkjb52xbqg.png\" alt=\"Substack\" width=\"250\" height=\"30\"><\/a><\/p>\n\n<p><a href=\"https:\/\/feedback.confdroid.com\/\" rel=\"noopener noreferrer\"><img src=\"https:\/\/media2.dev.to\/dynamic\/image\/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto\/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy7d47hck6vziak35nfgf.png\" alt=\"ConfDroid Feedback Portal\" width=\"300\" height=\"63\"><\/a><\/p>\n\n<h2>\n  \n  \n  Related posts\n<\/h2>\n\n<ul>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-pilot\/\" rel=\"noopener noreferrer\">Confdroid Puppet Modules - Pilot<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-puppet\/\" rel=\"noopener noreferrer\">Confdroid Puppet Modules - Puppet<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-resources\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - confdroid_resources<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-postgresql\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Postgresql<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-gitea\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Gitea<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-apache\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Apache<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-nagios\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Nagios<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-nrpe\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - NRPE<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-fail2ban\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Fail2ban<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-automatic\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - Automatic<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-ssh\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - SSH<\/a><\/li>\n<li><a href=\"https:\/\/confdroid.com\/confdroid-puppet-module-java\/\" rel=\"noopener noreferrer\">ConfDroid Puppet Modules - java<\/a><\/li>\n<\/ul>\n\n","category":["selinux","security","puppet","foreman"]},{"title":"Puppet Core 8.18.0 is out: macOS 15 support and key security updates","pubDate":"Thu, 09 Apr 2026 12:06:38 +0000","link":"https:\/\/dev.to\/puppet\/puppet-core-8180-is-out-macos-15-support-and-key-security-updates-2ng8","guid":"https:\/\/dev.to\/puppet\/puppet-core-8180-is-out-macos-15-support-and-key-security-updates-2ng8","description":"<p>You can now download Puppet Core <strong>8.18.0<\/strong>! This update adds support for macOS 15 and includes several important security updates to help keep your infrastructure protected.<\/p>\n\n<p>As always, Puppet Core releases focus on stability, platform support, and staying ahead of reported vulnerabilities.<\/p>\n\n<p>\ud83d\udc49 <a href=\"https:\/\/help.puppet.com\/core\/current\/Content\/PuppetCore\/PuppetReleaseNotes\/release_notes_puppet_x-8-18-0.htm\" rel=\"noopener noreferrer\">Official Puppet Core 8.18 release notes<\/a><\/p>\n\n\n\n\n<h2>\n  \n  \n  What\u2019s new in Puppet Core 8.18.0\n<\/h2>\n\n<ul>\n<li>\n<strong>Support for macOS 15<\/strong>: Puppet Core now supports macOS 15 on both x86_64 and ARM architectures. This enables continued management of macOS systems using the same automation controls and policies you already rely on.<\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Security focused dependency updates\n<\/h2>\n\n<p>Security remains a top priority in every Puppet Core release. This release includes updates to several bundled components to address recently disclosed security vulnerabilities. By delivering these updates as part of hardened Puppet Core builds, you reduce dependency risk without tracking, validating, or rebuilding components independently. <\/p>\n\n<h3>\n  \n  \n  \ud83d\udd10 libxml2 updated\n<\/h3>\n\n<ul>\n<li>\n<strong>libxml2<\/strong> has been updated to <strong>version 2.15.2<\/strong>\n<\/li>\n<li>Addresses the following CVEs:\n\n<ul>\n<li>CVE-2026-0989<\/li>\n<li>CVE-2026-0990<\/li>\n<li>CVE-2026-0992<\/li>\n<li>CVE-2026-1757<\/li>\n<\/ul>\n\n\n<\/li>\n\n<\/ul>\n\n<h3>\n  \n  \n  \ud83d\udd10 zlib gem updated\n<\/h3>\n\n<ul>\n<li>\n<strong>zlib gem<\/strong> updated to <strong>version 3.0.1<\/strong>\n<\/li>\n<li>Addresses:\n\n<ul>\n<li>CVE-2026-27820<\/li>\n<\/ul>\n\n\n<\/li>\n\n<\/ul>\n\n<h3>\n  \n  \n  \ud83d\udd10 curl updated\n<\/h3>\n\n<ul>\n<li>\n<strong>curl<\/strong> updated to <strong>version 8.19.0<\/strong>\n<\/li>\n<li>Addresses:\n\n<ul>\n<li>CVE-2026-1965<\/li>\n<li>CVE-2026-3783<\/li>\n<li>CVE-2026-3784<\/li>\n<li>CVE-2026-3805<\/li>\n<\/ul>\n\n\n<\/li>\n\n<\/ul>\n\n<p>If you rely on Puppet Core in security\u2011sensitive or regulated environments, this release is strongly recommended.<\/p>\n\n\n\n\n<h2>\n  \n  \n  Getting Puppet Core 8.18.0\n<\/h2>\n\n<p>You can upgrade to Puppet Core 8.18.0 using your existing Puppet Core repositories and standard upgrade workflows. Upgrading to Puppet Core 8.18.0 helps you take advantage of the latest platform support, reduce exposure to dependency related security risk, and rely on vendor-tested packages instead of managing updates yourself.<\/p>\n\n<p>As always:<\/p>\n\n<ul>\n<li>Test upgrades in a staging environment first<\/li>\n<li>Review the full release notes for platform\u2011specific details<\/li>\n<li>Roll out broadly once validated<\/li>\n<\/ul>\n\n<p>\ud83d\udcc4 <strong>Puppet Core Installation Docs:<\/strong>  <\/p>\n\n<ul>\n<li><a href=\"https:\/\/help.puppet.com\/core\/current\/Content\/PuppetCore\/install_puppet.htm\" rel=\"noopener noreferrer\">Installing Puppet Core<\/a><\/li>\n<li><a href=\"https:\/\/help.puppet.com\/core\/current\/Content\/PuppetCore\/upgrade.htm\" rel=\"noopener noreferrer\">Upgrading Puppet Core<\/a><\/li>\n<\/ul>\n\n<h2>\n  \n  \n  Let us know how it goes\n<\/h2>\n\n<p>If you\u2019re upgrading to 8.18.0, running Puppet Core on macOS 15, or have feedback on this release, let us know in the comments. Your input helps shape future updates.<\/p>\n\n<p>Happy puppeting!<\/p>\n\n","category":["puppet","devops","security","automation"]},{"title":"Puppet Enterprise - Neue Releases und Upgrade Zyklen","pubDate":"Wed, 08 Apr 2026 13:59:44 +0000","link":"https:\/\/dev.to\/betadots\/puppet-enterprise-neue-releases-und-upgrade-zyklen-i13","guid":"https:\/\/dev.to\/betadots\/puppet-enterprise-neue-releases-und-upgrade-zyklen-i13","description":"<p>Bisher gab es bei Puppet Enterprise 2 unterschiedliche Support Releases:<\/p>\n\n<ol>\n<li>LTS - Long Term Support und<\/li>\n<li>STS - Standard (oder Short) Term Support<\/li>\n<\/ol>\n\n<p>Die LTS Releases hatten \u00fcblicherweise 2 bis 3 Jahre Support, bevor man ein Upgrade durchf\u00fchren musste.<br>\nBei STS Releases bezog sich der Support nur auf das jeweils letzte Release.<\/p>\n\n<p>Mit Puppet Enterprise 2026 (<a href=\"https:\/\/www.puppet.com\/products\/puppet-enterprise\/support-lifecycle\" rel=\"noopener noreferrer\">Release ist angek\u00fcndigt f\u00fcr August 2026<\/a>) hat <a href=\"https:\/\/perforce.com\" rel=\"noopener noreferrer\">Perforce<\/a> die Support Matrix \u00fcberarbeitet.<br>\nDer neue Support Zyklus wird als <code>Latest \/ Latest-1<\/code> bezeichnet.<\/p>\n\n<p>In diesem Posting werden die wesentlichen Unterschiede dargestellt und was man in Zukunft bei der Nutzung von Puppet Enterprise ber\u00fccksichtigen sollte.<\/p>\n\n\n\n\n<h2>\n  \n  \n  Latest\n<\/h2>\n\n<p>Mit <code>Latest<\/code> wird das jeweils aktuelle Puppet Enterprise <strong>Major<\/strong> Release bezeichnet.<br>\nAktuell ist dies das letzte Release von PE 2025.<\/p>\n\n<p>Mit dem Release von PE 2026, wird PE 2026 das <code>Latest<\/code> Support Release.<\/p>\n\n<p><code>Latest<\/code> Releases haben einen vollst\u00e4ndigen Support \u00fcber einen Zeitraum von 12 Monaten.<br>\nInnerhalb dieses Zeitraumes sind neue Features und Verbesserungen, Sicherheitsupdates und Fehlerkorrekturen im Support verf\u00fcgbar.<\/p>\n\n<p>Danach gibt es in der Folge Minor Releases, die viertelj\u00e4hrlich zur Verf\u00fcgung gestellt werden.<\/p>\n\n<h2>\n  \n  \n  Latest-1\n<\/h2>\n\n<p>Als <code>Latest-1<\/code> wird das jeweilige vorherige Release bezeichnet, nachdem eine neue Major Version ver\u00f6ffentlicht wurde.<\/p>\n\n<p>Wenn PE 2026 released wird, wird das PE 2025 Release zu <code>Latest-1<\/code>.<\/p>\n\n<p><code>Latest-1<\/code> Releases haben einen eingeschr\u00e4nkten Support \u00fcber einen Zeitraum von 12 Monaten.<br>\nInnerhalb dieses Zeitraumes sind nur Sicherheitsupdates und Fehlerkorrekturen im Support verf\u00fcgbar.<\/p>\n\n<h2>\n  \n  \n  aktuelles LTS Releases\n<\/h2>\n\n<p>Das aktuelle LTS Release von Puppet Enterprise ist die Version 2023.8.<br>\nMit dem Release von PE 2026 wird diese Version nicht mehr unterst\u00fctzt.<\/p>\n\n<p>Alle anderen \u00e4lteren Puppet Enterprise Releases sind nicht mehr im Support enthalten.<br>\nWenn eine \u00e4ltere Puppet Enterprise Version als PE 2025 im Einsatz ist, sollte unbedingt ein Upgrade geplant und durchgef\u00fchrt werden. Welche Upgrades m\u00f6glich sind, ist in der <a href=\"https:\/\/help.puppet.com\/pe\/current\/topics\/supported_upgrade_paths.htm\" rel=\"noopener noreferrer\">Dokumentation zu Puppet Enterprise Upgrades<\/a> hinterlegt.<\/p>\n\n<h2>\n  \n  \n  Releases und Support Zeitraum\n<\/h2>\n\n<p>Stand 08.04.2026<\/p>\n\n<div class=\"table-wrapper-paragraph\"><table>\n<thead>\n<tr>\n<th>PE Version<\/th>\n<th>Support Beginn<\/th>\n<th>Support Name<\/th>\n<th>Support Umfang<\/th>\n<th>Support Ende<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>2023.8.x<\/td>\n<td>\u00a0aktuell<\/td>\n<td>LTS<\/td>\n<td>Vollst\u00e4ndiger Support<\/td>\n<td>08\/2026<\/td>\n<\/tr>\n<tr>\n<td>2023.8.x<\/td>\n<td>08\/2026<\/td>\n<td>LTS<\/td>\n<td>eingeschr\u00e4nkter Support<\/td>\n<td>02\/2027<\/td>\n<\/tr>\n<tr>\n<td>\u00a02025.x<\/td>\n<td>aktuell<\/td>\n<td>Latest<\/td>\n<td>Vollst\u00e4ndiger Support<\/td>\n<td>08\/2026<\/td>\n<\/tr>\n<tr>\n<td>2025.x<\/td>\n<td>08\/2026<\/td>\n<td>Latest-1<\/td>\n<td>eingeschr\u00e4nkter Support<\/td>\n<td>08\/2027<\/td>\n<\/tr>\n<tr>\n<td>2026.x<\/td>\n<td>08\/2026<\/td>\n<td>Latest<\/td>\n<td>\u00a0Vollst\u00e4ndiger Support<\/td>\n<td>??\/2027<\/td>\n<\/tr>\n<tr>\n<td>2026.x<\/td>\n<td>??\/2027<\/td>\n<td>Latest-1<\/td>\n<td>\u00a0eingeschr\u00e4nkter Support<\/td>\n<td>??\/2028<\/td>\n<\/tr>\n<tr>\n<td>\u00a02027.x<\/td>\n<td>??\/2027<\/td>\n<td>Latest<\/td>\n<td>Vollst\u00e4ndiger Support<\/td>\n<td>??\/2028<\/td>\n<\/tr>\n<tr>\n<td>2027.x<\/td>\n<td>??\/2028<\/td>\n<td>Latest-1<\/td>\n<td>eingeschr\u00e4nkter Support<\/td>\n<td>??\/2029<\/td>\n<\/tr>\n<tr>\n<td>2028.x<\/td>\n<td>??\/2028<\/td>\n<td>\u00a0Latest<\/td>\n<td>\u00a0Vollst\u00e4ndiger Support<\/td>\n<td>\u00a0??\/2029<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n\n<h2>\n  \n  \n  Zusammenfassung\n<\/h2>\n\n<p>Perforce entwirrt und standardisiert die Support Zyklen.<br>\nMit den j\u00e4hrliche Major Releases und definierten Zeitr\u00e4umen f\u00fcr den eingeschr\u00e4nkten Support k\u00f6nnen Kunden innerhalb von 24 Monaten ein Update durchf\u00fchren, ohne den Support zu verlieren.<\/p>\n\n<p>Bei der Vorbereitung und Durchf\u00fchrung von Updates unterst\u00fctzen wir unsere Kunden gern.<\/p>\n\n","category":["automation","puppet","news"]}]}}